General
-
Target
2025-05-17_c11d7890166c0ba59bc63031343ffa44_agent-tesla_amadey_black-basta_cobalt-strike_darkgate_elex_luca-stealer
-
Size
938KB
-
Sample
250517-r1583svnv8
-
MD5
c11d7890166c0ba59bc63031343ffa44
-
SHA1
ebadeaf2a2cb9e8fa43a73bd65067ad2e8776af5
-
SHA256
da15432bd0bd2e0764e774a749390ba61bd94af44768168e5f7863239642551f
-
SHA512
5cfc223cf1a1d37a525896e919b62a3701f84a05b7daf2f7d5fa2d24e3b21aa0806c9763c5c9d088fa1f4fb78f67da41a2b274fe5f4633fc79431ddbeca6ab2a
-
SSDEEP
24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8aweb:tTvC/MTQYxsWR7awe
Static task
static1
Behavioral task
behavioral1
Sample
2025-05-17_c11d7890166c0ba59bc63031343ffa44_agent-tesla_amadey_black-basta_cobalt-strike_darkgate_elex_luca-stealer.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
2025-05-17_c11d7890166c0ba59bc63031343ffa44_agent-tesla_amadey_black-basta_cobalt-strike_darkgate_elex_luca-stealer.exe
Resource
win11-20250502-en
Malware Config
Extracted
http://185.156.72.2/testmine/random.exe
Extracted
http://185.156.72.2/testmine/random.exe
Extracted
lumma
https://6racxilb.digital/ozi
https://narrathfpt.top/tekq
https://jackthyfuc.run/xpas
https://onehunqpom.life/zpxd
https://laminaflbx.shop/twoq
https://dovercovtcg.top/juhd
https://blackswmxc.top/bgry
https://posseswsnc.top/akds
https://featurlyin.top/pdal
https://ninepicchf.bet/lznd
https://uvoznessxyy.life/bnaz
https://zmedtipp.live/mnvzx
https://interpwthc.digital/juab
https://clatteqrpq.digital/kljz
https://overcovtcg.top/juhd
https://blackljjwc.run/banj
https://meteorplyp.live/lekp
https://flowerexju.bet/lanz
https://easterxeen.run/zavc
https://araucahkbm.live/baneb
https://uovercovtcg.top/juhd
https://cornerdurv.top/adwq
https://flaminaflbx.shop/twoq
https://govercovtcg.top/juhd
Extracted
http://185.156.72.2/testmine/random.exe
Targets
-
-
Target
2025-05-17_c11d7890166c0ba59bc63031343ffa44_agent-tesla_amadey_black-basta_cobalt-strike_darkgate_elex_luca-stealer
-
Size
938KB
-
MD5
c11d7890166c0ba59bc63031343ffa44
-
SHA1
ebadeaf2a2cb9e8fa43a73bd65067ad2e8776af5
-
SHA256
da15432bd0bd2e0764e774a749390ba61bd94af44768168e5f7863239642551f
-
SHA512
5cfc223cf1a1d37a525896e919b62a3701f84a05b7daf2f7d5fa2d24e3b21aa0806c9763c5c9d088fa1f4fb78f67da41a2b274fe5f4633fc79431ddbeca6ab2a
-
SSDEEP
24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8aweb:tTvC/MTQYxsWR7awe
-
Detects Rhadamanthys payload
-
Lumma family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Looks for VirtualBox Guest Additions in registry
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Looks for VMWare Tools registry key
-
Possible privilege escalation attempt
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1Virtualization/Sandbox Evasion
2Discovery
Peripheral Device Discovery
1Process Discovery
1Query Registry
7Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2