Analysis
-
max time kernel
196s -
max time network
239s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 17:07
Static task
static1
Behavioral task
behavioral1
Sample
794498ffa21e3d8cdc90a595ac32bf14b75354f24d4e13454b32915008714d6b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
794498ffa21e3d8cdc90a595ac32bf14b75354f24d4e13454b32915008714d6b.exe
Resource
win10v2004-20230220-en
General
-
Target
794498ffa21e3d8cdc90a595ac32bf14b75354f24d4e13454b32915008714d6b.exe
-
Size
416KB
-
MD5
f98f62fdc757bf3638e68378e0b64c79
-
SHA1
cdb7bd57abfe55068279580cad5a69b3aec7f09a
-
SHA256
794498ffa21e3d8cdc90a595ac32bf14b75354f24d4e13454b32915008714d6b
-
SHA512
4d3ded3ab71baede2bbd36175257312e223bc443b06f2e5c5361308854ec82d23b8312040a90c63ebafa7fc7cf45e0c08b7b190a5f076637205bca36db0ba05d
-
SSDEEP
6144:C7brB2Ae02q685UudALgUnXMVy1Q0jr/fqaJ:C7bF2Ae0N6CdWjMVyZ/P
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 6 IoCs
Processes:
resource yara_rule behavioral1/memory/912-61-0x00000000002A0000-0x00000000002BC000-memory.dmp family_rhadamanthys behavioral1/memory/912-63-0x00000000002A0000-0x00000000002BC000-memory.dmp family_rhadamanthys behavioral1/memory/912-64-0x00000000002A0000-0x00000000002BC000-memory.dmp family_rhadamanthys behavioral1/memory/912-65-0x00000000002A0000-0x00000000002BC000-memory.dmp family_rhadamanthys behavioral1/memory/912-67-0x00000000002A0000-0x00000000002BC000-memory.dmp family_rhadamanthys behavioral1/memory/912-69-0x00000000002A0000-0x00000000002BC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.