Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 18:48
Static task
static1
Behavioral task
behavioral1
Sample
dfc221c1422a7a5bbed87f30993d5f40f9db8af66e181ff44b316d773c9a2e93.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dfc221c1422a7a5bbed87f30993d5f40f9db8af66e181ff44b316d773c9a2e93.exe
Resource
win10v2004-20230220-en
General
-
Target
dfc221c1422a7a5bbed87f30993d5f40f9db8af66e181ff44b316d773c9a2e93.exe
-
Size
416KB
-
MD5
42101b17728ec6cd7ade8ce9cbc8aad8
-
SHA1
7ae801b3277869c0222b2bafa09cb7aac51bfdbe
-
SHA256
dfc221c1422a7a5bbed87f30993d5f40f9db8af66e181ff44b316d773c9a2e93
-
SHA512
96021beeaa62899fc36991016a25f37fdd2324914d190dc279814a70d6079178b935097fce07fc62bedb83ed05346e48c8d13ad0bf10ae72f71a04ce3516ef16
-
SSDEEP
12288:JJ5A7EtNuuIAwAjzj9wi6j+dg9DZW2+nv3nQ4:J/UEtN7wAjz2qdg9D8v3L
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1532-60-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/1532-62-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/1532-63-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/1532-66-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.