Fuck
Behavioral task
behavioral1
Sample
2025-03-31_5ac84114dc4ceab491c4703d6844e5b2_amadey_karagany_rhadamanthys_smoke-loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-31_5ac84114dc4ceab491c4703d6844e5b2_amadey_karagany_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-31_5ac84114dc4ceab491c4703d6844e5b2_amadey_karagany_rhadamanthys_smoke-loader
-
Size
108KB
-
MD5
5ac84114dc4ceab491c4703d6844e5b2
-
SHA1
b8aa7f1948a28b87035023d1e1f8f01d768e4b5e
-
SHA256
b388d2aa6e7699366014fac7c69384eaf8a13de0d7656281841fcb386dfcf2b4
-
SHA512
5141044b024524a7fc3c046b781ee70a20285acb995288103ff4432960d0af87da6e8eff30958b00b949ca8507bcffedea837bd393ee6a16c4314059c3034d93
-
SSDEEP
1536:nwUHibBDAEGNDL+VepMa+WIy1fAqR9SfPmtvki3bTKkVlnPbah68XEPVFc5:w0i9D8pM9W91fAXev5jhah68XEPVFc5
Malware Config
Extracted
valleyrat_s2
1.0
43.248.173.35:6666
43.248.173.35:8888
-
campaign_date
2025. 3.15
Signatures
-
Valleyrat_s2 family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-31_5ac84114dc4ceab491c4703d6844e5b2_amadey_karagany_rhadamanthys_smoke-loader
Files
-
2025-03-31_5ac84114dc4ceab491c4703d6844e5b2_amadey_karagany_rhadamanthys_smoke-loader.exe windows:5 windows x86 arch:x86
b8bf08fa843a9ec1ce10d80fbf550c26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSectionAndSpinCount
HeapDestroy
LeaveCriticalSection
HeapCreate
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
SetEvent
Sleep
CreateEventA
GetLastError
CloseHandle
GetCurrentThreadId
SwitchToThread
SetLastError
WideCharToMultiByte
lstrlenW
InterlockedExchange
ResetEvent
CreateEventW
CancelIo
TryEnterCriticalSection
SetWaitableTimer
CreateWaitableTimerW
GetThreadContext
InterlockedCompareExchange
OpenProcess
GetFileAttributesA
GetExitCodeProcess
CreateProcessA
GetSystemDirectoryA
VirtualAllocEx
WriteProcessMemory
ResumeThread
FreeLibrary
SetUnhandledExceptionFilter
GetCurrentProcess
LoadLibraryW
GetConsoleWindow
CreateFileW
GetProcAddress
GetLocalTime
IsDebuggerPresent
GetCurrentProcessId
CreateThread
LCMapStringW
WriteConsoleW
SetStdHandle
GetStringTypeW
MultiByteToWideChar
HeapFree
InterlockedDecrement
InterlockedIncrement
HeapAlloc
VirtualAlloc
SetThreadContext
VirtualFree
IsValidCodePage
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
RtlUnwind
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetStartupInfoW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapReAlloc
HeapSize
GetProcessHeap
ExitThread
DecodePointer
EncodePointer
GetCommandLineW
HeapSetInformation
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
user32
DispatchMessageW
PostThreadMessageA
PeekMessageW
TranslateMessage
MsgWaitForMultipleObjects
ShowWindow
GetInputState
wsprintfW
advapi32
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyW
RegSetValueExW
ws2_32
WSAWaitForMultipleEvents
WSAIoctl
connect
WSAStartup
select
WSAResetEvent
setsockopt
WSACleanup
recv
socket
closesocket
send
WSASetLastError
WSACreateEvent
shutdown
WSAEventSelect
WSAEnumNetworkEvents
WSAGetLastError
WSACloseEvent
htons
gethostbyname
winmm
timeGetTime
Exports
Exports
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ