Analysis
-
max time kernel
182s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 15:47
Static task
static1
Behavioral task
behavioral1
Sample
2b535c2d6700f17b16df4b917755f339277f007bcac1b78ee3b93d4ed6005c68.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2b535c2d6700f17b16df4b917755f339277f007bcac1b78ee3b93d4ed6005c68.exe
Resource
win10v2004-20230220-en
General
-
Target
2b535c2d6700f17b16df4b917755f339277f007bcac1b78ee3b93d4ed6005c68.exe
-
Size
278KB
-
MD5
6a933a4a98e92fb8498243936f9cf0cf
-
SHA1
dcf6034abd763d9207c313c516e56ddc6f6468bd
-
SHA256
2b535c2d6700f17b16df4b917755f339277f007bcac1b78ee3b93d4ed6005c68
-
SHA512
67c8f2ebf66404745b53ef18c0383c4e103ae83984d6f1f2b762be624f796a27dfe1bbf3230adaaaf11e9026595b30863eef423a4fcf410ed52086ce711ae9b2
-
SSDEEP
3072:OWs3VdLYkqSf1UKKKbzU6acMNWeDqXBUYydGTTupSXJPvsNb6Ux45KXaj:u3jqS7bOdWe+XBHy4apkJPvsNB3Xa
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4292-138-0x0000000002080000-0x000000000209C000-memory.dmp family_rhadamanthys behavioral2/memory/4292-139-0x0000000002080000-0x000000000209C000-memory.dmp family_rhadamanthys behavioral2/memory/4292-140-0x00000000020B0000-0x00000000020CA000-memory.dmp family_rhadamanthys behavioral2/memory/4292-141-0x0000000002080000-0x000000000209C000-memory.dmp family_rhadamanthys behavioral2/memory/4292-143-0x0000000002080000-0x000000000209C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.