General
-
Target
2025-04-03_ab12f41e2e7b4faf5936da3ebcf4243a_amadey_karagany_rhadamanthys_smoke-loader
-
Size
108KB
-
Sample
250403-wj35ls1wbs
-
MD5
ab12f41e2e7b4faf5936da3ebcf4243a
-
SHA1
274f20e845d5ea3dc53621f9b674dc62e271efb8
-
SHA256
f29e35c4c6bb6b273822a2754e8eb6755cd4a3dee014ecccbbc97ca2a500dcbc
-
SHA512
a33c0e9f2d701dda65b179f28d4806886fe12bfc8c1e9220a9f6c20e1c127b4c3a7a24feb83f10a905607df9756e52f6cefd1314167d5a1ba65c35ab065f7ab1
-
SSDEEP
3072:w0i9D8pM9W91fAXev5jhW9h68XEPSCK5:w0iapM6fAXePZ1ax
Behavioral task
behavioral1
Sample
2025-04-03_ab12f41e2e7b4faf5936da3ebcf4243a_amadey_karagany_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
valleyrat_s2
1.0
154.219.97.191:6666
-
campaign_date
2025. 3.14
Targets
-
-
Target
2025-04-03_ab12f41e2e7b4faf5936da3ebcf4243a_amadey_karagany_rhadamanthys_smoke-loader
-
Size
108KB
-
MD5
ab12f41e2e7b4faf5936da3ebcf4243a
-
SHA1
274f20e845d5ea3dc53621f9b674dc62e271efb8
-
SHA256
f29e35c4c6bb6b273822a2754e8eb6755cd4a3dee014ecccbbc97ca2a500dcbc
-
SHA512
a33c0e9f2d701dda65b179f28d4806886fe12bfc8c1e9220a9f6c20e1c127b4c3a7a24feb83f10a905607df9756e52f6cefd1314167d5a1ba65c35ab065f7ab1
-
SSDEEP
3072:w0i9D8pM9W91fAXev5jhW9h68XEPSCK5:w0iapM6fAXePZ1ax
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-