General
-
Target
random.exe
-
Size
415KB
-
Sample
250517-dqlj2afm6x
-
MD5
26cc5a6cfd8e8ecc433337413c14cddb
-
SHA1
5aeb775b0ea1de9e2e74e12e1b71df8cf459733d
-
SHA256
e29a3db17025e34336b10d36e5dd59ff5d1ac07ada8df0cddba0d3f3db689f65
-
SHA512
7fe6a058e5a62550ed260adc392216cd011d566aab51fd116ee7fc7d7504b72e3e0eb39c91428356b52e5c84f339258ddf966ee9d402c95aaf2328bafa57bbb4
-
SSDEEP
6144:3iUuGdolfFd313lcnGpPpnbJoHtbspmZfkCw3uWgGUS/T+WiU+9GTA/nw4AO2Y0k:3iUuGdolfFd1lGkpbCVkCweWgB7v9j
Behavioral task
behavioral1
Sample
random.exe
Resource
win10ltsc2021-20250425-en
Malware Config
Extracted
amadey
5.34
8d33eb
http://185.156.72.96
-
install_dir
d610cf342e
-
install_file
ramez.exe
-
strings_key
4a2b1d794e79a4532b6e2b679408d2bb
-
url_paths
/te4h2nus/index.php
Extracted
http://185.156.72.2/testmine/random.exe
Extracted
lumma
https://venaetdqfn.run/gjud
https://saxecocnak.live/manj
https://testcawepr.run/dsap
https://emphatakpn.bet/ladk
https://laminaflbx.shop/twoq
https://overcovtcg.top/juhd
https://blackswmxc.top/bgry
https://posseswsnc.top/akds
https://featurlyin.top/pdal
https://tortoisgfe.top/paxk
https://.orjinalecza.net/lxaz
https://deczakozmetik.net/qop
https://orijinalecza.org/jub
https://eczamedikal.org/vax
https://orijinalecza.net/kazd
https://rmedicalbitkisel.net/juj
https://nsnakejh.top/adsk
https://aposseswsnc.top/akds
https://ecornerdurv.top/adwq
https://narrathfpt.top/tekq
https://jackthyfuc.run/xpas
https://onehunqpom.life/zpxd
Targets
-
-
Target
random.exe
-
Size
415KB
-
MD5
26cc5a6cfd8e8ecc433337413c14cddb
-
SHA1
5aeb775b0ea1de9e2e74e12e1b71df8cf459733d
-
SHA256
e29a3db17025e34336b10d36e5dd59ff5d1ac07ada8df0cddba0d3f3db689f65
-
SHA512
7fe6a058e5a62550ed260adc392216cd011d566aab51fd116ee7fc7d7504b72e3e0eb39c91428356b52e5c84f339258ddf966ee9d402c95aaf2328bafa57bbb4
-
SSDEEP
6144:3iUuGdolfFd313lcnGpPpnbJoHtbspmZfkCw3uWgGUS/T+WiU+9GTA/nw4AO2Y0k:3iUuGdolfFd1lGkpbCVkCweWgB7v9j
-
Amadey family
-
Detects Rhadamanthys payload
-
Lumma family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Zloader family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Looks for VMWare Tools registry key
-
Modifies Windows Firewall
-
Possible privilege escalation attempt
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Modifies file permissions
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
1Disable or Modify System Firewall
1Modify Authentication Process
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Virtualization/Sandbox Evasion
4Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
6Credentials In Files
5Credentials in Registry
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
11Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
4