General
-
Target
random.exe
-
Size
1.8MB
-
Sample
250420-c2me2atlz7
-
MD5
a4442e4267d3d5b639f79f08b52bbb1b
-
SHA1
e4741a2091c03939fb2c7f8eb2be940b09d42131
-
SHA256
f2584f132a6e2588475dd0dbcb480d0e84988029d54d8bea33b0410df1734a58
-
SHA512
fab6972044ce38728a7765d19f05b5c2d198e61eaa36762559a1964a9eea8f0a1fe45df9bfeb2603e25d02c5c9cd97885d55e9cb75f0186880dd279e5eed0ccc
-
SSDEEP
49152:fbwoAqWRZQ5mDPf47OXC6h0X4eOPy4DK:jTCZ+mDPQ7+C6WPOVDK
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win11-20250410-en
Malware Config
Extracted
lumma
https://clarmodq.top/qoxo
https://opiratetwrath.run/ytus
https://.changeaie.top/geps
https://quilltayle.live/gksi
https://liftally.top/xasj
https://nighetwhisper.top/lekd
https://4asalaccgfa.top/gsooz
https://zestmodp.top/zeda
https://starofliught.top/wozd
https://meerkaty.digital/sagf
https://piratetwrath.run/ytus
https://changeaie.top/geps
https://ssalaccgfa.top/gsooz
https://jawdedmirror.run/ewqd
https://lonfgshadow.live/xawi
https://3liftally.top/xasj
https://.nighetwhisper.top/lekd
https://salaccgfa.top/gsooz
https://owlflright.digital/qopy
https://nchangeaie.top/geps
https://7salaccgfa.top/gsooz
https://xstarofliught.top/wozd
https://v0salaccgfa.top/gsooz
Extracted
amadey
5.34
8ac6b9
http://185.215.113.59
-
install_dir
f1e82329e5
-
install_file
namez.exe
-
strings_key
022d16de15289562e076160ac426da7d
-
url_paths
/Dy5h4kus/index.php
Extracted
darkvision
82.29.67.160
-
url
http://107.174.192.179/data/003
https://grabify.link/ZATFQO
http://107.174.192.179/clean
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Targets
-
-
Target
random.exe
-
Size
1.8MB
-
MD5
a4442e4267d3d5b639f79f08b52bbb1b
-
SHA1
e4741a2091c03939fb2c7f8eb2be940b09d42131
-
SHA256
f2584f132a6e2588475dd0dbcb480d0e84988029d54d8bea33b0410df1734a58
-
SHA512
fab6972044ce38728a7765d19f05b5c2d198e61eaa36762559a1964a9eea8f0a1fe45df9bfeb2603e25d02c5c9cd97885d55e9cb75f0186880dd279e5eed0ccc
-
SSDEEP
49152:fbwoAqWRZQ5mDPf47OXC6h0X4eOPy4DK:jTCZ+mDPQ7+C6WPOVDK
-
Amadey family
-
Darkvision family
-
Detects Rhadamanthys payload
-
Lumma family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Safe Mode Boot
1Modify Authentication Process
1Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4