Analysis
-
max time kernel
178s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 18:44
Static task
static1
Behavioral task
behavioral1
Sample
dc50eaf82d7bc4d4900da2b7f9be3ec186def2b93c2eeab1da75a8aa56ef2b4c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dc50eaf82d7bc4d4900da2b7f9be3ec186def2b93c2eeab1da75a8aa56ef2b4c.exe
Resource
win10v2004-20230220-en
General
-
Target
dc50eaf82d7bc4d4900da2b7f9be3ec186def2b93c2eeab1da75a8aa56ef2b4c.exe
-
Size
338KB
-
MD5
6a8c39ace1c8c6718217155bb614db38
-
SHA1
40a996c2aff0a557b3d83abfe385627deb59ac06
-
SHA256
dc50eaf82d7bc4d4900da2b7f9be3ec186def2b93c2eeab1da75a8aa56ef2b4c
-
SHA512
84a62fbb043035c4356b7b1445c1021aa61f12f6318c1e6ac6bfcac3d9dda3aec51ac2528c13d7906a4422d969598d8bfe5739ec19164c813edf1eeb413214d7
-
SSDEEP
6144:gZTAhOWfgvO0gRrLnfeIMtsptBon0jqp3qOIbx:gZM4WfKQnmIZ3PWNIb
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4388-139-0x0000000000990000-0x00000000009AC000-memory.dmp family_rhadamanthys behavioral2/memory/4388-140-0x0000000000990000-0x00000000009AC000-memory.dmp family_rhadamanthys behavioral2/memory/4388-141-0x00000000009B0000-0x00000000009CA000-memory.dmp family_rhadamanthys behavioral2/memory/4388-142-0x0000000000990000-0x00000000009AC000-memory.dmp family_rhadamanthys behavioral2/memory/4388-144-0x0000000000990000-0x00000000009AC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.