General
-
Target
507a8fb56f78014c53466d7edd0dd540cc7c313ae492486eb9af983efc5f9f52
-
Size
2.1MB
-
Sample
230307-18t1fsbh41
-
MD5
0e18c5b06390a4f13c89e5deb15bc588
-
SHA1
16414552b6f3e79ac6734a438fe37398d8dce208
-
SHA256
507a8fb56f78014c53466d7edd0dd540cc7c313ae492486eb9af983efc5f9f52
-
SHA512
10d1b03cd30533e463b232b6c53f6874fedaf112aa950b2216857ad9f4535d6d50f92109e1b9a7cbcac538dccbd6454189f451d1a563e2ab84015903ea4e2795
-
SSDEEP
24576:KiqrQJsIr/LoODDiYCv3CjuOpyVXIg4l8FO4+DpGba2NzJef5z/1rjSTl:Kiqx4o2bCywVm8E6ehrOTl
Static task
static1
Behavioral task
behavioral1
Sample
507a8fb56f78014c53466d7edd0dd540cc7c313ae492486eb9af983efc5f9f52.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
507a8fb56f78014c53466d7edd0dd540cc7c313ae492486eb9af983efc5f9f52.exe
Resource
win10-20230220-en
Malware Config
Targets
-
-
Target
507a8fb56f78014c53466d7edd0dd540cc7c313ae492486eb9af983efc5f9f52
-
Size
2.1MB
-
MD5
0e18c5b06390a4f13c89e5deb15bc588
-
SHA1
16414552b6f3e79ac6734a438fe37398d8dce208
-
SHA256
507a8fb56f78014c53466d7edd0dd540cc7c313ae492486eb9af983efc5f9f52
-
SHA512
10d1b03cd30533e463b232b6c53f6874fedaf112aa950b2216857ad9f4535d6d50f92109e1b9a7cbcac538dccbd6454189f451d1a563e2ab84015903ea4e2795
-
SSDEEP
24576:KiqrQJsIr/LoODDiYCv3CjuOpyVXIg4l8FO4+DpGba2NzJef5z/1rjSTl:Kiqx4o2bCywVm8E6ehrOTl
Score10/10-
Detect rhadamanthys stealer shellcode
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-