Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 16:13
Static task
static1
Behavioral task
behavioral1
Sample
3c63861682c8d454b9f3956d71c4c9c6abe8e81e69c8080c027a4c1883c32073.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3c63861682c8d454b9f3956d71c4c9c6abe8e81e69c8080c027a4c1883c32073.exe
Resource
win10v2004-20230220-en
General
-
Target
3c63861682c8d454b9f3956d71c4c9c6abe8e81e69c8080c027a4c1883c32073.exe
-
Size
278KB
-
MD5
1206e816e3ae6ffcf80d81733f85aa11
-
SHA1
8837ccbd6028c17e8d98878b403c6e460827003c
-
SHA256
3c63861682c8d454b9f3956d71c4c9c6abe8e81e69c8080c027a4c1883c32073
-
SHA512
fe3d8c36ca0891c87cb889c674fb0c7a7491ad459b73f841f1f48c4def2aeb55493d940031030ba3db84b914aef2b8edc9f4eb844129a5e0966e99195c4205cf
-
SSDEEP
3072:1Bov+2uXxJ21xYGlqydzPxtEPIc64ffwWajYYK6wnZdBhZUaerz26iiAd4y5PTvZ:rQxtoydrO360wZYYZ6P8nVATvBme9
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4712-138-0x0000000002C20000-0x0000000002C3C000-memory.dmp family_rhadamanthys behavioral2/memory/4712-139-0x0000000002C20000-0x0000000002C3C000-memory.dmp family_rhadamanthys behavioral2/memory/4712-141-0x0000000002C20000-0x0000000002C3C000-memory.dmp family_rhadamanthys behavioral2/memory/4712-143-0x0000000002C20000-0x0000000002C3C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.