General
-
Target
2025-04-02_3186ca0f702c14e896be4706d0b7bbcf_amadey_rhadamanthys_smoke-loader
-
Size
406KB
-
Sample
250402-3ea2lavyet
-
MD5
3186ca0f702c14e896be4706d0b7bbcf
-
SHA1
ef81a27b4b2e46292c4be8c7ed6507436f1953b2
-
SHA256
d780e60f01ed0cb77b148451b9d3f895715a1a10f860fc4a4eac9f6b140ae8de
-
SHA512
cccec15778526f4078646fbbca82683dd1366a6cdf2c197bc58537215963524d8dbd59bb94eb6b3137deba8ca966593b50b629c081341cb6f7870bfd819ed5c9
-
SSDEEP
12288:0Z7Q2o8wE39uW8wESByvNv54B9f01ZmHB9:mQ2o8wDW8wQvr4B9f01Zmv
Behavioral task
behavioral1
Sample
2025-04-02_3186ca0f702c14e896be4706d0b7bbcf_amadey_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
berbew
http://viruslist.com/wcmd.txt
http://viruslist.com/ppslog.php
http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Targets
-
-
Target
2025-04-02_3186ca0f702c14e896be4706d0b7bbcf_amadey_rhadamanthys_smoke-loader
-
Size
406KB
-
MD5
3186ca0f702c14e896be4706d0b7bbcf
-
SHA1
ef81a27b4b2e46292c4be8c7ed6507436f1953b2
-
SHA256
d780e60f01ed0cb77b148451b9d3f895715a1a10f860fc4a4eac9f6b140ae8de
-
SHA512
cccec15778526f4078646fbbca82683dd1366a6cdf2c197bc58537215963524d8dbd59bb94eb6b3137deba8ca966593b50b629c081341cb6f7870bfd819ed5c9
-
SSDEEP
12288:0Z7Q2o8wE39uW8wESByvNv54B9f01ZmHB9:mQ2o8wDW8wQvr4B9f01Zmv
Score10/10-
Adds autorun key to be loaded by Explorer.exe on startup
-
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger
-
Executes dropped EXE
-
Drops file in System32 directory
-