C:\gom87\coy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-06_46b9d887b4702263cdbddfea57eeca8e_amadey_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-06_46b9d887b4702263cdbddfea57eeca8e_amadey_rhadamanthys_smoke-loader
-
Size
282KB
-
MD5
46b9d887b4702263cdbddfea57eeca8e
-
SHA1
28fbe23677c1a9bf3f76ce5b74450795f2b6972a
-
SHA256
f70d2be11332753f0cf5c52822b248f70debdcb49da5295011b6de33f4fa2d47
-
SHA512
2edfd8648c123da57f664e1e2a91523502f0cc899397cbb719609de48f96ef92bd96df9df682fa4228db3af45497df419695c187dd6e7ed3f1deb96fe6f42be6
-
SSDEEP
3072:E/KHdcqCW0fvkZJi4v02Uo5jduu8goVsP1S3rVeXQRjihbuZqWzQ/CDF9n+rVyz+:eK9GW0SwEdNU283PghbmqSHDvGVyph
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-04-06_46b9d887b4702263cdbddfea57eeca8e_amadey_rhadamanthys_smoke-loader
Files
-
2025-04-06_46b9d887b4702263cdbddfea57eeca8e_amadey_rhadamanthys_smoke-loader.exe windows:5 windows x86 arch:x86
8d838a1f1d72271929aafc07672308f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLocaleInfoA
GetConsoleAliasExesA
GetNumberOfConsoleInputEvents
FindResourceExW
ReadConsoleA
GetNumberOfConsoleMouseButtons
GetCurrentActCtx
GetLogicalDriveStringsW
WaitForSingleObject
InterlockedCompareExchange
GetModuleHandleW
GetTickCount
VirtualFree
GenerateConsoleCtrlEvent
GetConsoleAliasesA
GetConsoleAliasesLengthA
GetDateFormatA
GetPriorityClass
GlobalAlloc
LoadLibraryW
FreeConsole
GetCalendarInfoA
GetVersionExW
GlobalFlags
WritePrivateProfileStructW
FindNextVolumeW
CreateMutexW
CreateActCtxA
GetACP
GetLargestConsoleWindowSize
OpenMutexW
GetLastError
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
LoadLibraryA
WriteConsoleA
FindFirstVolumeMountPointW
GetNumberFormatW
FindAtomA
GetModuleFileNameA
GetModuleHandleA
GetCommTimeouts
RequestWakeupLatency
VirtualProtect
GetCurrentDirectoryA
WaitForDebugEvent
GetCurrentThreadId
AddConsoleAliasA
OpenFileMappingA
CommConfigDialogW
ReadFile
CreateTimerQueue
LocalUnlock
GetProcessHeap
SetEndOfFile
HeapFree
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
WideCharToMultiByte
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
HeapAlloc
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapSize
RtlUnwind
WriteFile
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
IsValidCodePage
CloseHandle
CreateFileA
SetStdHandle
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
user32
CharUpperBuffW
LoadMenuW
GetCaretPos
advapi32
MapGenericMask
ReportEventW
winhttp
WinHttpOpen
Sections
.text Size: 226KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ