Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 18:46
Static task
static1
Behavioral task
behavioral1
Sample
dea37e055803e471eb68fe1e5253ac7b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dea37e055803e471eb68fe1e5253ac7b.exe
Resource
win10v2004-20230220-en
General
-
Target
dea37e055803e471eb68fe1e5253ac7b.exe
-
Size
397KB
-
MD5
dea37e055803e471eb68fe1e5253ac7b
-
SHA1
a5b98c85fc3f49e2453c311ab0b488670b006526
-
SHA256
c960b48ec683adf04827b29b6dff2cd84bf2e84b89e482edc2458c164e1f3652
-
SHA512
a3704e83c89258b5c5e19d5518ddfd786a17d0999186fdabfc5ba13b5521224451dae39e16822d78c4557a1f9297cb998ef9e74c5b263c69aac0d0e1be549123
-
SSDEEP
6144:xg6HNucTlDVuOSvFQ51Fd5kWxRvn1mJI3yPq7rpxrzgxz5z+zAtPEw6:xg6t3lDVL++5F5kWx4ICPYpNzU5S/b
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1692-59-0x0000000000270000-0x000000000028C000-memory.dmp family_rhadamanthys behavioral1/memory/1692-60-0x0000000000270000-0x000000000028C000-memory.dmp family_rhadamanthys behavioral1/memory/1692-62-0x0000000000270000-0x000000000028C000-memory.dmp family_rhadamanthys behavioral1/memory/1692-65-0x0000000000270000-0x000000000028C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.