Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/04/2023, 22:11

General

  • Target

    c973c87d98a07bf9142fcdcb4a2b647db3e17ddf20b3fcdfffe00892d3a2bbb8.exe

  • Size

    315KB

  • MD5

    a3dc7bc486875187109ab0dac462520c

  • SHA1

    00957b6b261f58ca6a6a5accc497a763751ea750

  • SHA256

    c973c87d98a07bf9142fcdcb4a2b647db3e17ddf20b3fcdfffe00892d3a2bbb8

  • SHA512

    a222648f98b47ce551b7baf34a2b4096adacf38ceb9cc7dab9cde62b1d92e8a1e5fc49c0d810694a8b5d8b91bd83b2e4cf3e20d8cea35e45af3c310d81e581df

  • SSDEEP

    6144:u3pZadXkyaVar38YhT/kc32/eRVP7yOHZtkjt:u5ZYXkwPhT5Gt

Score
10/10

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c973c87d98a07bf9142fcdcb4a2b647db3e17ddf20b3fcdfffe00892d3a2bbb8.exe
    "C:\Users\Admin\AppData\Local\Temp\c973c87d98a07bf9142fcdcb4a2b647db3e17ddf20b3fcdfffe00892d3a2bbb8.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1444

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1444-122-0x0000000002540000-0x000000000256E000-memory.dmp

          Filesize

          184KB

        • memory/1444-123-0x0000000000400000-0x0000000000803000-memory.dmp

          Filesize

          4.0MB

        • memory/1444-126-0x0000000000980000-0x000000000099C000-memory.dmp

          Filesize

          112KB

        • memory/1444-128-0x0000000000980000-0x000000000099C000-memory.dmp

          Filesize

          112KB

        • memory/1444-129-0x0000000002570000-0x0000000002572000-memory.dmp

          Filesize

          8KB

        • memory/1444-130-0x0000000002570000-0x0000000002573000-memory.dmp

          Filesize

          12KB

        • memory/1444-131-0x0000000000980000-0x000000000099C000-memory.dmp

          Filesize

          112KB

        • memory/1444-132-0x0000000000400000-0x0000000000803000-memory.dmp

          Filesize

          4.0MB

        • memory/1444-133-0x0000000000980000-0x000000000099C000-memory.dmp

          Filesize

          112KB