Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 16:38
Static task
static1
Behavioral task
behavioral1
Sample
59125a0d141bc42bb1b791f91ba243755c5d7c957f4651726ae62ee3de52defe.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
59125a0d141bc42bb1b791f91ba243755c5d7c957f4651726ae62ee3de52defe.exe
Resource
win10v2004-20230220-en
General
-
Target
59125a0d141bc42bb1b791f91ba243755c5d7c957f4651726ae62ee3de52defe.exe
-
Size
279KB
-
MD5
7d2134ec02768357ab0846569be5f416
-
SHA1
060ea3d9b29ac208d346a61d558821f897a303a5
-
SHA256
59125a0d141bc42bb1b791f91ba243755c5d7c957f4651726ae62ee3de52defe
-
SHA512
8121c56f033794422b0e55b4b1f30c628edf28e0d9616e4b5103a405fe44afa8bda0f23ed312734fd194413c687283f8c82d24fd1e44ca78135f55310a9e2bf2
-
SSDEEP
6144:H1dhkEeufZDu5hoAOQVujywO/cCvoZGqEbNv:H1TkEeufs/piGRbN
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4464-138-0x00000000021C0000-0x00000000021DC000-memory.dmp family_rhadamanthys behavioral2/memory/4464-140-0x00000000021C0000-0x00000000021DC000-memory.dmp family_rhadamanthys behavioral2/memory/4464-141-0x00000000021C0000-0x00000000021DC000-memory.dmp family_rhadamanthys behavioral2/memory/4464-143-0x00000000021C0000-0x00000000021DC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.