General
-
Target
66906c8af1236b3097fdd170cea6b4dacc4a9df4a491aa1285c1fba45f41360f
-
Size
1.8MB
-
Sample
230308-egzwqsdh43
-
MD5
0089eede6a0cbf540f4b724a965a12c4
-
SHA1
c1240858dc3609275e9036c12aa6a300f1907d33
-
SHA256
66906c8af1236b3097fdd170cea6b4dacc4a9df4a491aa1285c1fba45f41360f
-
SHA512
124b5fe2f14beec2adea7a638cfac089227fcdcf25485d4d28971808ab80b144e58b9756511a1ccd9b893c3e692f86a58ea9af3e581a54a6f0867d7e1fb0f9d0
-
SSDEEP
24576:exG5ObB0Av+GO3yd3bkkLYOFTxU+XASp26spzctp0jwJdhxPQEai:eQG3bk+YW5nHmjw/QEa
Static task
static1
Behavioral task
behavioral1
Sample
66906c8af1236b3097fdd170cea6b4dacc4a9df4a491aa1285c1fba45f41360f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
66906c8af1236b3097fdd170cea6b4dacc4a9df4a491aa1285c1fba45f41360f.exe
Resource
win10-20230220-en
Malware Config
Targets
-
-
Target
66906c8af1236b3097fdd170cea6b4dacc4a9df4a491aa1285c1fba45f41360f
-
Size
1.8MB
-
MD5
0089eede6a0cbf540f4b724a965a12c4
-
SHA1
c1240858dc3609275e9036c12aa6a300f1907d33
-
SHA256
66906c8af1236b3097fdd170cea6b4dacc4a9df4a491aa1285c1fba45f41360f
-
SHA512
124b5fe2f14beec2adea7a638cfac089227fcdcf25485d4d28971808ab80b144e58b9756511a1ccd9b893c3e692f86a58ea9af3e581a54a6f0867d7e1fb0f9d0
-
SSDEEP
24576:exG5ObB0Av+GO3yd3bkkLYOFTxU+XASp26spzctp0jwJdhxPQEai:eQG3bk+YW5nHmjw/QEa
Score10/10-
Detect rhadamanthys stealer shellcode
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-