Static task
static1
Behavioral task
behavioral1
Sample
2025-04-04_3de07fc37b1ec7bcc81605a734e3d1d4_amadey_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-04_3de07fc37b1ec7bcc81605a734e3d1d4_amadey_rhadamanthys_smoke-loader
-
Size
11.1MB
-
MD5
3de07fc37b1ec7bcc81605a734e3d1d4
-
SHA1
a8e4cc3a1ae14ad10186c64ed8a9502093f05967
-
SHA256
25b5a02112f637745bdafc3cabfac046a51e4a22c94a2fdefbc73a4fda4d1d2d
-
SHA512
f479165819a3cf589cf411cabc1da93f5037214fc3c417bb8a76c00b3c94d87126a4332cb557e4578cc6fc131b11c0babcda8efc6249938093e016adcaab92c1
-
SSDEEP
6144:kWJVsv5VHd74XANXpZu0wn81Nm89qmrHTL8h6ly5bdnG:RVsvb6XANXpgV67qE/tlyvG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-04-04_3de07fc37b1ec7bcc81605a734e3d1d4_amadey_rhadamanthys_smoke-loader
Files
-
2025-04-04_3de07fc37b1ec7bcc81605a734e3d1d4_amadey_rhadamanthys_smoke-loader.exe windows:5 windows x86 arch:x86
badcef689a420643ae2b57db91ed247f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOverlappedResult
GetProcAddress
GetModuleHandleA
ActivateActCtx
GlobalLock
GetStringTypeExW
GetNumberOfConsoleMouseButtons
SetEvent
GetLogicalDriveStringsA
QueryDosDeviceW
InterlockedIncrement
UpdateResourceW
GetTickCount
GetLastError
GetThreadPriorityBoost
lstrlenA
GetCPInfo
GetSystemWindowsDirectoryW
GetCurrentThreadId
GetNumaAvailableMemoryNode
FreeEnvironmentStringsW
GlobalAlloc
LockFile
GlobalWire
EnumDateFormatsA
AddConsoleAliasA
ReplaceFileA
GetVersionExA
TerminateProcess
WriteConsoleW
ExitThread
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentProcess
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
IsValidCodePage
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
InitializeCriticalSectionAndSpinCount
SetFilePointer
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
advapi32
DestroyPrivateObjectSecurity
RegisterServiceCtrlHandlerA
OpenServiceA
LookupAccountSidA
RegDeleteValueW
DuplicateToken
RegQueryInfoKeyW
SetServiceStatus
RegDeleteValueA
OpenProcessToken
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 63KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10.9MB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ