Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-04-2023 22:49
Static task
static1
Behavioral task
behavioral1
Sample
14dbef5e901d55daa121a1a0bd990a3f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
14dbef5e901d55daa121a1a0bd990a3f.exe
Resource
win10v2004-20230220-en
General
-
Target
14dbef5e901d55daa121a1a0bd990a3f.exe
-
Size
290KB
-
MD5
14dbef5e901d55daa121a1a0bd990a3f
-
SHA1
385eb2ff906c4dc5adce764c861c46c89e6a8037
-
SHA256
13b5445e6178d6dff8a61f60b380004eebaa8c9115c95e37cdb20cf2c3b3d284
-
SHA512
cceafa7073bad9e17c7fdda0d14e4d79f27972c7d7c7112fdc57838063b7d6018829246dfc7a110e1bac7839f7000d37ed0ffa0d7061be4093a3d8ea7301a668
-
SSDEEP
3072:gIlxlL52BwnSSb87MhLV32mPIWlIRm3QKVDqrl0dWfVQTF0pH8wJKVCvMNt6seXe:1j/STgN9EmFDq6NR88G2C0ilhW
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1928-59-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/1928-60-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/1928-62-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/1928-65-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.