Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
c973c87d98a07bf9142fcdcb4a2b647db3e17ddf20b3fcdfffe00892d3a2bbb8.exe
Resource
win10-20230220-en
3 signatures
150 seconds
General
-
Target
c973c87d98a07bf9142fcdcb4a2b647db3e17ddf20b3fcdfffe00892d3a2bbb8.exe
-
Size
315KB
-
MD5
a3dc7bc486875187109ab0dac462520c
-
SHA1
00957b6b261f58ca6a6a5accc497a763751ea750
-
SHA256
c973c87d98a07bf9142fcdcb4a2b647db3e17ddf20b3fcdfffe00892d3a2bbb8
-
SHA512
a222648f98b47ce551b7baf34a2b4096adacf38ceb9cc7dab9cde62b1d92e8a1e5fc49c0d810694a8b5d8b91bd83b2e4cf3e20d8cea35e45af3c310d81e581df
-
SSDEEP
6144:u3pZadXkyaVar38YhT/kc32/eRVP7yOHZtkjt:u5ZYXkwPhT5Gt
Score
10/10
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral1/memory/1444-126-0x0000000000980000-0x000000000099C000-memory.dmp family_rhadamanthys behavioral1/memory/1444-128-0x0000000000980000-0x000000000099C000-memory.dmp family_rhadamanthys behavioral1/memory/1444-131-0x0000000000980000-0x000000000099C000-memory.dmp family_rhadamanthys behavioral1/memory/1444-133-0x0000000000980000-0x000000000099C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1444 c973c87d98a07bf9142fcdcb4a2b647db3e17ddf20b3fcdfffe00892d3a2bbb8.exe 1444 c973c87d98a07bf9142fcdcb4a2b647db3e17ddf20b3fcdfffe00892d3a2bbb8.exe 1444 c973c87d98a07bf9142fcdcb4a2b647db3e17ddf20b3fcdfffe00892d3a2bbb8.exe