Malware Analysis Report

2025-08-06 00:40

Sample ID 230419-czkteshf2x
Target 3aa2d4932a82925ba0e3188a417b98e20e1dd1ec58e4ff86ae9e9919f649aba0
SHA256 3aa2d4932a82925ba0e3188a417b98e20e1dd1ec58e4ff86ae9e9919f649aba0
Tags
rhadamanthys collection stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3aa2d4932a82925ba0e3188a417b98e20e1dd1ec58e4ff86ae9e9919f649aba0

Threat Level: Known bad

The file 3aa2d4932a82925ba0e3188a417b98e20e1dd1ec58e4ff86ae9e9919f649aba0 was found to be: Known bad.

Malicious Activity Summary

rhadamanthys collection stealer

Detect rhadamanthys stealer shellcode

Rhadamanthys

Accesses Microsoft Outlook profiles

Program crash

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

outlook_office_path

outlook_win_path

Checks processor information in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-04-19 02:30

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-04-19 02:30

Reported

2023-04-19 02:33

Platform

win10v2004-20230220-en

Max time kernel

144s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3aa2d4932a82925ba0e3188a417b98e20e1dd1ec58e4ff86ae9e9919f649aba0.exe"

Signatures

Detect rhadamanthys stealer shellcode

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Rhadamanthys

stealer rhadamanthys

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook C:\Windows\system32\dllhost.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook C:\Windows\system32\dllhost.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook C:\Windows\system32\dllhost.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Windows\system32\dllhost.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Windows\system32\dllhost.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Windows\system32\dllhost.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\system32\dllhost.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\system32\dllhost.exe N/A

outlook_office_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Windows\system32\dllhost.exe N/A

outlook_win_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Windows\system32\dllhost.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3aa2d4932a82925ba0e3188a417b98e20e1dd1ec58e4ff86ae9e9919f649aba0.exe

"C:\Users\Admin\AppData\Local\Temp\3aa2d4932a82925ba0e3188a417b98e20e1dd1ec58e4ff86ae9e9919f649aba0.exe"

C:\Windows\system32\dllhost.exe

"C:\Windows\system32\dllhost.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4680 -ip 4680

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 696

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 126.158.241.8.in-addr.arpa udp
US 8.8.8.8:53 33.146.190.20.in-addr.arpa udp
US 209.197.3.8:80 tcp
US 8.8.8.8:53 42.220.44.20.in-addr.arpa udp
US 8.8.8.8:53 55.37.195.20.in-addr.arpa udp
US 8.8.8.8:53 177.17.30.184.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 52.152.108.96:443 tcp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
PA 179.43.142.201:80 catalog.s.download.windowsupdate.com tcp
US 8.8.8.8:53 201.142.43.179.in-addr.arpa udp
PA 179.43.142.201:80 179.43.142.201 tcp
US 52.152.108.96:443 tcp
US 20.189.173.5:443 tcp
US 52.152.108.96:443 tcp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 62.13.109.52.in-addr.arpa udp
US 8.8.8.8:53 2.36.159.162.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 99.113.223.173.in-addr.arpa udp
US 8.8.8.8:53 113.66.64.40.in-addr.arpa udp
US 8.8.8.8:53 250.255.255.239.in-addr.arpa udp
US 8.8.8.8:53 50.4.107.13.in-addr.arpa udp
US 8.8.8.8:53 32.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 1.208.79.178.in-addr.arpa udp
US 8.8.8.8:53 254.128.241.8.in-addr.arpa udp
US 93.184.220.29:80 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
US 8.8.8.8:53 126.130.241.8.in-addr.arpa udp
US 8.8.8.8:53 1.202.248.87.in-addr.arpa udp

Files

memory/4680-134-0x00000000009C0000-0x00000000009EE000-memory.dmp

memory/4680-135-0x0000000000400000-0x000000000080F000-memory.dmp

memory/4680-136-0x00000000009C0000-0x00000000009EE000-memory.dmp

memory/4680-139-0x0000000002580000-0x000000000259C000-memory.dmp

memory/4680-140-0x0000000002580000-0x000000000259C000-memory.dmp

memory/4680-141-0x0000000002580000-0x000000000259C000-memory.dmp

memory/3892-142-0x00000240E3190000-0x00000240E3191000-memory.dmp

memory/3892-144-0x00000240E34A0000-0x00000240E34A7000-memory.dmp

memory/4680-143-0x0000000002580000-0x000000000259C000-memory.dmp

memory/3892-145-0x00007FF3FE900000-0x00007FF3FE9FA000-memory.dmp

memory/3892-146-0x00007FF3FE900000-0x00007FF3FE9FA000-memory.dmp

memory/4680-147-0x0000000000400000-0x000000000080F000-memory.dmp

memory/3892-148-0x00007FF3FE900000-0x00007FF3FE9FA000-memory.dmp

memory/3892-149-0x00007FF3FE900000-0x00007FF3FE9FA000-memory.dmp

memory/3892-150-0x00007FF3FE900000-0x00007FF3FE9FA000-memory.dmp

memory/3892-151-0x00007FF3FE900000-0x00007FF3FE9FA000-memory.dmp