Analysis
-
max time kernel
189s -
max time network
219s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 16:48
Static task
static1
Behavioral task
behavioral1
Sample
64d1e37fd6b8a1e08cd66ac039a919e1212b02e53433f6c4584bc4782b52ede0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
64d1e37fd6b8a1e08cd66ac039a919e1212b02e53433f6c4584bc4782b52ede0.exe
Resource
win10v2004-20230220-en
General
-
Target
64d1e37fd6b8a1e08cd66ac039a919e1212b02e53433f6c4584bc4782b52ede0.exe
-
Size
397KB
-
MD5
3784f28b2ae512d3416fc9632cf8815d
-
SHA1
4b8591c36b468cf8e0b05bcd0225ab6c5f9b4b7c
-
SHA256
64d1e37fd6b8a1e08cd66ac039a919e1212b02e53433f6c4584bc4782b52ede0
-
SHA512
a1504eff163a8a34f5eb6049f9b8289bef09335f2eabf11f4f40ba42f5d30b5961857a89b82c1c61708061cff44fc77c25fd7a356bc48df5828e4bc7b85390dc
-
SSDEEP
12288:9qO2eANQZyVYXtqc+H1HvPxXaqIn0Q6h:9n2eANGGYUTH1PPl58gh
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 6 IoCs
Processes:
resource yara_rule behavioral1/memory/916-61-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/916-62-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/916-63-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/916-64-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/916-66-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/916-68-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.