General

  • Target

    2025-05-08_c4e128382fb3bd814ccb917487663b13_amadey_black-basta_elex_icedid_rhadamanthys_smoke-loader

  • Size

    5.6MB

  • Sample

    250508-y6tkssvzav

  • MD5

    c4e128382fb3bd814ccb917487663b13

  • SHA1

    1dcd65f968a0d6f1defb5fca0ccf23b894e3d288

  • SHA256

    d8ecaa93bcc011d4be5f21a24adac7bfa288237d1724ffe711c3de4236e2951a

  • SHA512

    599f1586a09e94eddf5efdfc510f43d9689927b58c0130180c43601a35380ed3e892932d4cf0fdce777525baee2b8b2ac49305a53c4853697b76feead17bbf36

  • SSDEEP

    49152:nfmiAmOHYew6TKhIbZgA2+0wh0BNw4YnRdHnWRHcfXb+50Tj:+mQd0wSXw1Vb9

Malware Config

Targets

    • Target

      2025-05-08_c4e128382fb3bd814ccb917487663b13_amadey_black-basta_elex_icedid_rhadamanthys_smoke-loader

    • Size

      5.6MB

    • MD5

      c4e128382fb3bd814ccb917487663b13

    • SHA1

      1dcd65f968a0d6f1defb5fca0ccf23b894e3d288

    • SHA256

      d8ecaa93bcc011d4be5f21a24adac7bfa288237d1724ffe711c3de4236e2951a

    • SHA512

      599f1586a09e94eddf5efdfc510f43d9689927b58c0130180c43601a35380ed3e892932d4cf0fdce777525baee2b8b2ac49305a53c4853697b76feead17bbf36

    • SSDEEP

      49152:nfmiAmOHYew6TKhIbZgA2+0wh0BNw4YnRdHnWRHcfXb+50Tj:+mQd0wSXw1Vb9

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »