Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2023, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
d920c9dc398bcc17b9fba347b1f371e54165da5f405735fcd9baa0b5de86c83b.exe
Resource
win10v2004-20230220-en
3 signatures
150 seconds
General
-
Target
d920c9dc398bcc17b9fba347b1f371e54165da5f405735fcd9baa0b5de86c83b.exe
-
Size
359KB
-
MD5
ff99d0dbb753c4f646f98788fe978354
-
SHA1
6126694f366f86c8864a328a9f1bdc4dc0ad839c
-
SHA256
d920c9dc398bcc17b9fba347b1f371e54165da5f405735fcd9baa0b5de86c83b
-
SHA512
028154dc7f88730a56ee9c9625122e3e3986964282767c07ca03a6485d964180a5210c9bd78b6502d5d5383889f1e887faf12b3f3737046a196a5bd663ee8e49
-
SSDEEP
6144:lXJ4LY1Tr9JArhttbLWE5IPXaBNI/Lj8+Eu:BJ4sT5JAlnp5I/aB6/LEu
Score
10/10
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
resource yara_rule behavioral1/memory/1584-139-0x0000000002C90000-0x0000000002CAC000-memory.dmp family_rhadamanthys behavioral1/memory/1584-140-0x0000000002CF0000-0x0000000002D0A000-memory.dmp family_rhadamanthys behavioral1/memory/1584-141-0x0000000002C90000-0x0000000002CAC000-memory.dmp family_rhadamanthys behavioral1/memory/1584-144-0x0000000002C90000-0x0000000002CAC000-memory.dmp family_rhadamanthys behavioral1/memory/1584-146-0x0000000002C90000-0x0000000002CAC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1584 d920c9dc398bcc17b9fba347b1f371e54165da5f405735fcd9baa0b5de86c83b.exe 1584 d920c9dc398bcc17b9fba347b1f371e54165da5f405735fcd9baa0b5de86c83b.exe 1584 d920c9dc398bcc17b9fba347b1f371e54165da5f405735fcd9baa0b5de86c83b.exe