General
-
Target
576f2b2a8d4adb743a7e9d7c163e37411b2a5ca25011156df57d3cf54a0a7e1e
-
Size
2.3MB
-
Sample
230307-186z1sbh5y
-
MD5
c05d093d1274562a0fa00e0b2c8bea5d
-
SHA1
e91b1526bb9ad0d80a785de7423baab366d5480e
-
SHA256
576f2b2a8d4adb743a7e9d7c163e37411b2a5ca25011156df57d3cf54a0a7e1e
-
SHA512
0d66ea8b0eb79c68fb9a7136a8c13962b70b457269af2dcce157289d85c8016dbdac0395d66764581456bde7856a77655e168490ebc63cb5f3501650c648a065
-
SSDEEP
24576:SR7d5Ic2Yc637ccFU/+VxjETkFqW0KbzYKVocc3Sxe31HZsGutdf7D1PGhWgOpBJ:wjIcK6hUSfchcHH1PEABhj
Static task
static1
Behavioral task
behavioral1
Sample
576f2b2a8d4adb743a7e9d7c163e37411b2a5ca25011156df57d3cf54a0a7e1e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
576f2b2a8d4adb743a7e9d7c163e37411b2a5ca25011156df57d3cf54a0a7e1e.exe
Resource
win10-20230220-en
Malware Config
Targets
-
-
Target
576f2b2a8d4adb743a7e9d7c163e37411b2a5ca25011156df57d3cf54a0a7e1e
-
Size
2.3MB
-
MD5
c05d093d1274562a0fa00e0b2c8bea5d
-
SHA1
e91b1526bb9ad0d80a785de7423baab366d5480e
-
SHA256
576f2b2a8d4adb743a7e9d7c163e37411b2a5ca25011156df57d3cf54a0a7e1e
-
SHA512
0d66ea8b0eb79c68fb9a7136a8c13962b70b457269af2dcce157289d85c8016dbdac0395d66764581456bde7856a77655e168490ebc63cb5f3501650c648a065
-
SSDEEP
24576:SR7d5Ic2Yc637ccFU/+VxjETkFqW0KbzYKVocc3Sxe31HZsGutdf7D1PGhWgOpBJ:wjIcK6hUSfchcHH1PEABhj
Score10/10-
Detect rhadamanthys stealer shellcode
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-