Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03/04/2023, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
ff500d61a43e135f0b3ca48e8c9e760e6d08fc0d9fc9b36ae7790dc2dbfba071.exe
Resource
win10-20230220-en
3 signatures
150 seconds
General
-
Target
ff500d61a43e135f0b3ca48e8c9e760e6d08fc0d9fc9b36ae7790dc2dbfba071.exe
-
Size
257KB
-
MD5
d0a8e9383b3e36dee5f9222f827c7615
-
SHA1
516812f265f8b3ce1af787bfa1dd1bfeb426e2cd
-
SHA256
ff500d61a43e135f0b3ca48e8c9e760e6d08fc0d9fc9b36ae7790dc2dbfba071
-
SHA512
73a4096c33c1b3ff42d60c6835fbd0ed240ee2ddd089cc7e70bd02688432672d432a517ce0169af9451098c0f3fb40f9975fde927816995fb546658e4078b1ae
-
SSDEEP
3072:tHYBEo83Gk/hdEdqaensiWFwV2JVZWmDNncsW5fkD2/O9iT1QPS5/8QS:6KP2g+0eFzVDZ+Six8
Score
10/10
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral1/memory/4124-121-0x00000000001E0000-0x00000000001FC000-memory.dmp family_rhadamanthys behavioral1/memory/4124-123-0x00000000001E0000-0x00000000001FC000-memory.dmp family_rhadamanthys behavioral1/memory/4124-126-0x00000000001E0000-0x00000000001FC000-memory.dmp family_rhadamanthys behavioral1/memory/4124-128-0x00000000001E0000-0x00000000001FC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4124 ff500d61a43e135f0b3ca48e8c9e760e6d08fc0d9fc9b36ae7790dc2dbfba071.exe 4124 ff500d61a43e135f0b3ca48e8c9e760e6d08fc0d9fc9b36ae7790dc2dbfba071.exe 4124 ff500d61a43e135f0b3ca48e8c9e760e6d08fc0d9fc9b36ae7790dc2dbfba071.exe