Fuck
Behavioral task
behavioral1
Sample
2025-03-31_361cd24e6bf1eb5b9487856813c28ad7_amadey_karagany_rhadamanthys_smoke-loader.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-03-31_361cd24e6bf1eb5b9487856813c28ad7_amadey_karagany_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-31_361cd24e6bf1eb5b9487856813c28ad7_amadey_karagany_rhadamanthys_smoke-loader
-
Size
108KB
-
MD5
361cd24e6bf1eb5b9487856813c28ad7
-
SHA1
0abdacf0b8bc383c5cc435c59facca2c6b655ed2
-
SHA256
91275ed96de927b79a85779d8f3e407165efc159166c6618152d9a5d8c3fb646
-
SHA512
4aa1059e8ea6fd6d5623efa9452f1660c30b842f7e7b273f46d5f1df90e1f7edb68e015bd6f78c945ce6ebb7410bab4efcc75f821855de8e89879fbc58fced5d
-
SSDEEP
1536:nwUHibBDAEGNDL+VepMa+WIy1fAqR9SfPmtvki3bTKkVlnPbah68XEPVGc5:w0i9D8pM9W91fAXev5jhah68XEPVGc5
Malware Config
Extracted
valleyrat_s2
1.0
43.248.173.35:6666
43.248.173.35:8888
-
campaign_date
2025. 3.15
Signatures
-
Valleyrat_s2 family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-31_361cd24e6bf1eb5b9487856813c28ad7_amadey_karagany_rhadamanthys_smoke-loader
Files
-
2025-03-31_361cd24e6bf1eb5b9487856813c28ad7_amadey_karagany_rhadamanthys_smoke-loader.exe windows:5 windows x86 arch:x86
b8bf08fa843a9ec1ce10d80fbf550c26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSectionAndSpinCount
HeapDestroy
LeaveCriticalSection
HeapCreate
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
SetEvent
Sleep
CreateEventA
GetLastError
CloseHandle
GetCurrentThreadId
SwitchToThread
SetLastError
WideCharToMultiByte
lstrlenW
InterlockedExchange
ResetEvent
CreateEventW
CancelIo
TryEnterCriticalSection
SetWaitableTimer
CreateWaitableTimerW
GetThreadContext
InterlockedCompareExchange
OpenProcess
GetFileAttributesA
GetExitCodeProcess
CreateProcessA
GetSystemDirectoryA
VirtualAllocEx
WriteProcessMemory
ResumeThread
FreeLibrary
SetUnhandledExceptionFilter
GetCurrentProcess
LoadLibraryW
GetConsoleWindow
CreateFileW
GetProcAddress
GetLocalTime
IsDebuggerPresent
GetCurrentProcessId
CreateThread
LCMapStringW
WriteConsoleW
SetStdHandle
GetStringTypeW
MultiByteToWideChar
HeapFree
InterlockedDecrement
InterlockedIncrement
HeapAlloc
VirtualAlloc
SetThreadContext
VirtualFree
IsValidCodePage
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
RtlUnwind
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetStartupInfoW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapReAlloc
HeapSize
GetProcessHeap
ExitThread
DecodePointer
EncodePointer
GetCommandLineW
HeapSetInformation
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
user32
DispatchMessageW
PostThreadMessageA
PeekMessageW
TranslateMessage
MsgWaitForMultipleObjects
ShowWindow
GetInputState
wsprintfW
advapi32
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyW
RegSetValueExW
ws2_32
WSAWaitForMultipleEvents
WSAIoctl
connect
WSAStartup
select
WSAResetEvent
setsockopt
WSACleanup
recv
socket
closesocket
send
WSASetLastError
WSACreateEvent
shutdown
WSAEventSelect
WSAEnumNetworkEvents
WSAGetLastError
WSACloseEvent
htons
gethostbyname
winmm
timeGetTime
Exports
Exports
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ