General
-
Target
7d6395cbe874549b54f4dac0ee701aefb4b4b307bd340d3b494f02e7a72f8c84
-
Size
2.5MB
-
Sample
230306-2as6yaef2w
-
MD5
3d84ce39d8cb9285df40744967c5ebb3
-
SHA1
a34d8ee19485d2163450c6bce9e6dbc1c7bdf5b2
-
SHA256
7d6395cbe874549b54f4dac0ee701aefb4b4b307bd340d3b494f02e7a72f8c84
-
SHA512
fa5b4ce179a5456c5e27a84582f615c07abbeaaa398a75185761a26c5304b28bc933f962a9270429b0b126e3fc6a753a8a594a9d9dd44a89cddd8c9d2ed5bb22
-
SSDEEP
24576:oBonefJLDzfB3emLYGySSodk0ubc7+ReEigLZjZlRPsTEDjCUNHafgO1dIdow:oBDtDzfBvModh5cxCUC1
Static task
static1
Behavioral task
behavioral1
Sample
7d6395cbe874549b54f4dac0ee701aefb4b4b307bd340d3b494f02e7a72f8c84.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7d6395cbe874549b54f4dac0ee701aefb4b4b307bd340d3b494f02e7a72f8c84.exe
Resource
win10-20230220-en
Malware Config
Targets
-
-
Target
7d6395cbe874549b54f4dac0ee701aefb4b4b307bd340d3b494f02e7a72f8c84
-
Size
2.5MB
-
MD5
3d84ce39d8cb9285df40744967c5ebb3
-
SHA1
a34d8ee19485d2163450c6bce9e6dbc1c7bdf5b2
-
SHA256
7d6395cbe874549b54f4dac0ee701aefb4b4b307bd340d3b494f02e7a72f8c84
-
SHA512
fa5b4ce179a5456c5e27a84582f615c07abbeaaa398a75185761a26c5304b28bc933f962a9270429b0b126e3fc6a753a8a594a9d9dd44a89cddd8c9d2ed5bb22
-
SSDEEP
24576:oBonefJLDzfB3emLYGySSodk0ubc7+ReEigLZjZlRPsTEDjCUNHafgO1dIdow:oBDtDzfBvModh5cxCUC1
Score10/10-
Detect rhadamanthys stealer shellcode
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-