Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-04-2023 04:44

General

  • Target

    1e60bdf73d00af0f0d47876c9546af14b9db68d5245074d07686b608bb67faf0.exe

  • Size

    397KB

  • MD5

    0f74f82c78498331790a5c0921e3eaad

  • SHA1

    b193ec495f33eaaef5df1442f7b8c1a99c3e8252

  • SHA256

    1e60bdf73d00af0f0d47876c9546af14b9db68d5245074d07686b608bb67faf0

  • SHA512

    d9c21cb2a4e2842e0e26b9a7ea3ac251e4b2d41288e3ed519a67bf0fcfa2a89f827e58af3e34856112f9d730093b96aa2e96d01cf99840a3c726f51b53a26c54

  • SSDEEP

    6144:q1RfdYiSKxibduQuR+/uv9CboEqzOFrSi:qHfdYiSOm/cCboYrSi

Score
10/10

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e60bdf73d00af0f0d47876c9546af14b9db68d5245074d07686b608bb67faf0.exe
    "C:\Users\Admin\AppData\Local\Temp\1e60bdf73d00af0f0d47876c9546af14b9db68d5245074d07686b608bb67faf0.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1716

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1716-117-0x0000000002450000-0x000000000247E000-memory.dmp

    Filesize

    184KB

  • memory/1716-118-0x0000000000400000-0x00000000022CC000-memory.dmp

    Filesize

    30.8MB

  • memory/1716-121-0x0000000004020000-0x000000000403C000-memory.dmp

    Filesize

    112KB

  • memory/1716-123-0x0000000004020000-0x000000000403C000-memory.dmp

    Filesize

    112KB

  • memory/1716-124-0x0000000002360000-0x0000000002362000-memory.dmp

    Filesize

    8KB

  • memory/1716-125-0x0000000002360000-0x0000000002363000-memory.dmp

    Filesize

    12KB

  • memory/1716-126-0x0000000004020000-0x000000000403C000-memory.dmp

    Filesize

    112KB

  • memory/1716-127-0x0000000000400000-0x00000000022CC000-memory.dmp

    Filesize

    30.8MB

  • memory/1716-128-0x0000000004020000-0x000000000403C000-memory.dmp

    Filesize

    112KB