General
-
Target
cd54265dcdbafb82cf28af895d630abe266f4352818473db3851e083d461170f
-
Size
2.0MB
-
Sample
230308-ehs5ksdd9s
-
MD5
05c2f3fa7336c5157acb8ba53ca596eb
-
SHA1
13206ae3a2eed804ad00ad23de66451976b808fa
-
SHA256
cd54265dcdbafb82cf28af895d630abe266f4352818473db3851e083d461170f
-
SHA512
3c712c28f94d1cf4ebc1f5e58aec864b08a626d52af8205578431f6d2fb73b8cf5d1f918fdd8a1aed8a6516ee003200eb3fdf20594019df186036624f7f67807
-
SSDEEP
24576:HrE1iHcU2c3YjVc6j4IqSpBY09NZM+V4Z8dtCz+fGx2LVWLkDJrxjeH:HrbUcuoIq2YchNJK
Static task
static1
Behavioral task
behavioral1
Sample
cd54265dcdbafb82cf28af895d630abe266f4352818473db3851e083d461170f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cd54265dcdbafb82cf28af895d630abe266f4352818473db3851e083d461170f.exe
Resource
win10-20230220-en
Malware Config
Targets
-
-
Target
cd54265dcdbafb82cf28af895d630abe266f4352818473db3851e083d461170f
-
Size
2.0MB
-
MD5
05c2f3fa7336c5157acb8ba53ca596eb
-
SHA1
13206ae3a2eed804ad00ad23de66451976b808fa
-
SHA256
cd54265dcdbafb82cf28af895d630abe266f4352818473db3851e083d461170f
-
SHA512
3c712c28f94d1cf4ebc1f5e58aec864b08a626d52af8205578431f6d2fb73b8cf5d1f918fdd8a1aed8a6516ee003200eb3fdf20594019df186036624f7f67807
-
SSDEEP
24576:HrE1iHcU2c3YjVc6j4IqSpBY09NZM+V4Z8dtCz+fGx2LVWLkDJrxjeH:HrbUcuoIq2YchNJK
Score10/10-
Detect rhadamanthys stealer shellcode
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-