General

  • Target

    2025-07-01_44af261e48f63fbb234042769d4a6c1c_amadey_coinminer_elex_rhadamanthys_smoke-loader_stop

  • Size

    5.6MB

  • Sample

    250701-jv913sdp7t

  • MD5

    44af261e48f63fbb234042769d4a6c1c

  • SHA1

    69921cb6443f40ea4d5bf95813efc9f3b602aec9

  • SHA256

    5b1a0a7308a42b5493f61bf2fd76b07d34deb8ae6aee12123a83816150946c1a

  • SHA512

    490ebc42bcdf3fe25977953913fa308d295721af8b11eb5c1a373a4cda5212550ac54cbfb07491ff3cb371a4ea23efcc657a4e6922f5841706a97284b296ac5b

  • SSDEEP

    49152:yDkYOMwwnMb4PmyVhXlxqCLhHt0Q7+V8tgJd80KhzqCejZnvgdo0BHtR:zYOXwnS4rVjx1LVt0Q7+Cga0Kt14vgzT

Malware Config

Targets

    • Target

      2025-07-01_44af261e48f63fbb234042769d4a6c1c_amadey_coinminer_elex_rhadamanthys_smoke-loader_stop

    • Size

      5.6MB

    • MD5

      44af261e48f63fbb234042769d4a6c1c

    • SHA1

      69921cb6443f40ea4d5bf95813efc9f3b602aec9

    • SHA256

      5b1a0a7308a42b5493f61bf2fd76b07d34deb8ae6aee12123a83816150946c1a

    • SHA512

      490ebc42bcdf3fe25977953913fa308d295721af8b11eb5c1a373a4cda5212550ac54cbfb07491ff3cb371a4ea23efcc657a4e6922f5841706a97284b296ac5b

    • SSDEEP

      49152:yDkYOMwwnMb4PmyVhXlxqCLhHt0Q7+V8tgJd80KhzqCejZnvgdo0BHtR:zYOXwnS4rVjx1LVt0Q7+Cga0Kt14vgzT

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks