Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2023 23:41
Static task
static1
Behavioral task
behavioral1
Sample
3e9f2d6f3466bf7721416511da663aa526c7c3fec155738bcb38839cba209aa4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3e9f2d6f3466bf7721416511da663aa526c7c3fec155738bcb38839cba209aa4.exe
Resource
win10v2004-20230221-en
General
-
Target
3e9f2d6f3466bf7721416511da663aa526c7c3fec155738bcb38839cba209aa4.exe
-
Size
338KB
-
MD5
a1655aaa4f4a1fa7f7dc53d2abb93b73
-
SHA1
806f9931d2185da21576afa0a1087a0507c9d78e
-
SHA256
3e9f2d6f3466bf7721416511da663aa526c7c3fec155738bcb38839cba209aa4
-
SHA512
8342fe74c39c113b8322fa8a9142a32675e3d8ba3920f02084b62a98779d37168ee23f3b5d3569e2fa30f283f301c9212116efbad16e91d2802f7aae8def6e68
-
SSDEEP
6144:/5gcYqjmFA9AJIWPix9433scuDc+BcVaqO2/:/579jm69AJixEpcBcVaN
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2548-139-0x0000000000960000-0x000000000097C000-memory.dmp family_rhadamanthys behavioral2/memory/2548-141-0x0000000000960000-0x000000000097C000-memory.dmp family_rhadamanthys behavioral2/memory/2548-143-0x0000000000960000-0x000000000097C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.