General

  • Target

    2025-04-03_535cbe0efd399c967d1461da8ff1ac6a_amadey_rhadamanthys_smoke-loader

  • Size

    400KB

  • Sample

    250403-w7y6kavks9

  • MD5

    535cbe0efd399c967d1461da8ff1ac6a

  • SHA1

    a4539ad34b6507041fb5359c5c779e8016ffce55

  • SHA256

    476ff2e39a9ef05c0d6d24dd3c5f19bae9d14b4e2d01dd295063527e6526602d

  • SHA512

    63043c54c93458ade285e403ecb85469d637b4718345feb0c817bdcacef67dda38449db596f2da4a0420644da6d891afbb82c21bb080ef6c814ccc13904fa440

  • SSDEEP

    6144:y+x1vgOwu6/CSQYJ8wEbbL5lULW8wEbq9ByvZ6Mxv5Rar3O6B9fZSLhZmz:y+fK2o8wE39uW8wESByvNv54B9f01Zm

Malware Config

Extracted

Family

berbew

C2

http://viruslist.com/wcmd.txt

http://viruslist.com/ppslog.php

http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Targets

    • Target

      2025-04-03_535cbe0efd399c967d1461da8ff1ac6a_amadey_rhadamanthys_smoke-loader

    • Size

      400KB

    • MD5

      535cbe0efd399c967d1461da8ff1ac6a

    • SHA1

      a4539ad34b6507041fb5359c5c779e8016ffce55

    • SHA256

      476ff2e39a9ef05c0d6d24dd3c5f19bae9d14b4e2d01dd295063527e6526602d

    • SHA512

      63043c54c93458ade285e403ecb85469d637b4718345feb0c817bdcacef67dda38449db596f2da4a0420644da6d891afbb82c21bb080ef6c814ccc13904fa440

    • SSDEEP

      6144:y+x1vgOwu6/CSQYJ8wEbbL5lULW8wEbq9ByvZ6Mxv5Rar3O6B9fZSLhZmz:y+fK2o8wE39uW8wESByvNv54B9f01Zm

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks