Static task
static1
General
-
Target
2025-04-14_d861201a7be39d9d64c838a7d442f88a_amadey_elex_rhadamanthys_smoke-loader
-
Size
21.1MB
-
MD5
d861201a7be39d9d64c838a7d442f88a
-
SHA1
34a77aa574a94776ad3cc1ac8e08e7d0c0c14de5
-
SHA256
027357b75f42189d2c44d9eda20b0f897310b2a2ac38e886632337b53dc00b90
-
SHA512
1a5e916a598861e0a4df4f748fec5c6143fc05c77fb63d114be62d3216f89513afc0a98d7376e3b7638094c820dcfc20837efeafd898c5ea60aa7073026d113f
-
SSDEEP
393216:A5UGARvJdFLuD4hZL/vfJqjupp/R3MdvEFM8p+4E9WjDRMJvJmv1LLyOVQoqdOsT:A5UG+oMhtnBqcNR3MBSpI9WjNMj2LLrA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-04-14_d861201a7be39d9d64c838a7d442f88a_amadey_elex_rhadamanthys_smoke-loader
Files
-
2025-04-14_d861201a7be39d9d64c838a7d442f88a_amadey_elex_rhadamanthys_smoke-loader.exe windows:4 windows x86 arch:x86
f2f9102c7663962c22d17a8dabc5e7ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
FindExecutableA
SHBrowseForFolderA
SHGetMalloc
user32
GetClientRect
SetRect
EndPaint
LoadCursorA
GetLastActivePopup
KillTimer
ShowWindow
PostMessageA
SendMessageA
EnableWindow
SetTimer
SetWindowTextA
SetForegroundWindow
SetActiveWindow
SetDlgItemTextA
GetKeyState
CharUpperBuffA
PeekMessageA
GetSysColor
DispatchMessageA
GetParent
SendDlgItemMessageA
GetDlgItem
InvalidateRect
UpdateWindow
LoadStringA
MessageBoxA
DialogBoxParamA
GetWindowLongA
SetWindowLongA
GetDlgItemTextA
EndDialog
GetWindowRect
GetSystemMetrics
SetWindowPos
SetCursor
CharNextA
BeginPaint
SetWindowWord
GetWindowWord
DefWindowProcA
RegisterClassA
TranslateMessage
kernel32
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
GetStdHandle
HeapCreate
HeapDestroy
VirtualAlloc
VirtualFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapSize
Sleep
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
GetVersionExA
FindClose
FindFirstFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
GetDriveTypeA
GetEnvironmentVariableA
SetFilePointer
CreateFileA
GetWindowsDirectoryA
GlobalFree
GlobalUnlock
GlobalHandle
_lclose
_llseek
_lread
_lopen
GlobalLock
GlobalAlloc
GlobalMemoryStatus
GetVersion
GetModuleFileNameA
WriteFile
GetSystemTime
LocalFree
ExitProcess
FormatMessageA
GetLastError
GetModuleHandleA
GetVolumeInformationA
WideCharToMultiByte
CreateProcessA
lstrcmpiA
SetErrorMode
MultiByteToWideChar
GetLocalTime
lstrlenA
CreateFileW
ReadFile
GetConsoleCP
GetConsoleMode
LoadLibraryA
InitializeCriticalSection
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
FlushFileBuffers
WriteConsoleW
CloseHandle
RtlUnwind
HeapAlloc
HeapFree
HeapReAlloc
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetProcAddress
TlsGetValue
TlsAlloc
gdi32
SetTextColor
SetTextAlign
GetBkColor
GetTextExtentPoint32A
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
DeleteObject
SetBkColor
advapi32
RegQueryValueA
comctl32
ord17
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_winzip_ Size: 21.0MB - Virtual size: 21.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.zero Size: 4KB - Virtual size: 3KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ