Fuck
Behavioral task
behavioral1
Sample
2025-04-03_c340aa33e5e049408b5cde62337a4b68_amadey_karagany_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-03_c340aa33e5e049408b5cde62337a4b68_amadey_karagany_rhadamanthys_smoke-loader
-
Size
108KB
-
MD5
c340aa33e5e049408b5cde62337a4b68
-
SHA1
a489fc8a32591b3e31597dec52cad3f551c0e84f
-
SHA256
8823e6f891681233c4ffdef699f86696c1c475086a71820fa2dc53852f027760
-
SHA512
5c7fe90a1cd9fba770dceae3ba0460e818beb4f231ca646af2074093a35b7e5c4c171e93ee16537cab75eb791a5564845c0ad5109c0ae52dff10859a3efc26cc
-
SSDEEP
1536:nwUHibBDAEGNDL+VepMa+WIy1fAqR9SfPmtvki3bTKkVlnPbEh68XEPVWl5:w0i9D8pM9W91fAXev5jhEh68XEPVWl5
Malware Config
Extracted
valleyrat_s2
1.0
154.219.97.191:6666
-
campaign_date
2025. 3.14
Signatures
-
Valleyrat_s2 family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-04-03_c340aa33e5e049408b5cde62337a4b68_amadey_karagany_rhadamanthys_smoke-loader
Files
-
2025-04-03_c340aa33e5e049408b5cde62337a4b68_amadey_karagany_rhadamanthys_smoke-loader.exe windows:5 windows x86 arch:x86
b8bf08fa843a9ec1ce10d80fbf550c26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSectionAndSpinCount
HeapDestroy
LeaveCriticalSection
HeapCreate
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
SetEvent
Sleep
CreateEventA
GetLastError
CloseHandle
GetCurrentThreadId
SwitchToThread
SetLastError
WideCharToMultiByte
lstrlenW
InterlockedExchange
ResetEvent
CreateEventW
CancelIo
TryEnterCriticalSection
SetWaitableTimer
CreateWaitableTimerW
GetThreadContext
InterlockedCompareExchange
OpenProcess
GetFileAttributesA
GetExitCodeProcess
CreateProcessA
GetSystemDirectoryA
VirtualAllocEx
WriteProcessMemory
ResumeThread
FreeLibrary
SetUnhandledExceptionFilter
GetCurrentProcess
LoadLibraryW
GetConsoleWindow
CreateFileW
GetProcAddress
GetLocalTime
IsDebuggerPresent
GetCurrentProcessId
CreateThread
LCMapStringW
WriteConsoleW
SetStdHandle
GetStringTypeW
MultiByteToWideChar
HeapFree
InterlockedDecrement
InterlockedIncrement
HeapAlloc
VirtualAlloc
SetThreadContext
VirtualFree
IsValidCodePage
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
RtlUnwind
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetStartupInfoW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapReAlloc
HeapSize
GetProcessHeap
ExitThread
DecodePointer
EncodePointer
GetCommandLineW
HeapSetInformation
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
user32
DispatchMessageW
PostThreadMessageA
PeekMessageW
TranslateMessage
MsgWaitForMultipleObjects
ShowWindow
GetInputState
wsprintfW
advapi32
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyW
RegSetValueExW
ws2_32
WSAWaitForMultipleEvents
WSAIoctl
connect
WSAStartup
select
WSAResetEvent
setsockopt
WSACleanup
recv
socket
closesocket
send
WSASetLastError
WSACreateEvent
shutdown
WSAEventSelect
WSAEnumNetworkEvents
WSAGetLastError
WSACloseEvent
htons
gethostbyname
winmm
timeGetTime
Exports
Exports
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ