Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 15:39
Static task
static1
Behavioral task
behavioral1
Sample
224a575de77c4d9f340848239adb20ec.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
224a575de77c4d9f340848239adb20ec.exe
Resource
win10v2004-20230220-en
General
-
Target
224a575de77c4d9f340848239adb20ec.exe
-
Size
353KB
-
MD5
224a575de77c4d9f340848239adb20ec
-
SHA1
db737d7f9dc6a6e8b3ed78ce1d7cfe1c3fe752ea
-
SHA256
e40c3dd832634b0847f84a4499047d9552a77a62245a99ccec4b084c948188c6
-
SHA512
0dfa38c02c87a0f97caa65a09ba6060797b5163b441367380fe736f5e452c7abb33fe665ba7e1cbaafca420b34a60744ed2342ed5cbed015e7e1dfc99b3daf1c
-
SSDEEP
3072:PuO0WqSzhFbMRMB8XnXQ7MfUXS80Xs5a/Ais391B0v2agQnoY9PYm85xZBdNzWTh:lYSFFwRNw7Cl85a4iUJJ+PVQZBdNi1
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2028-59-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/2028-61-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/2028-62-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/2028-63-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/2028-65-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/2028-67-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.