Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 18:50
Static task
static1
Behavioral task
behavioral1
Sample
e164802c98bccc8d0c2803f2de7b351ab27f55d2ffce8680d176a328286411e7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e164802c98bccc8d0c2803f2de7b351ab27f55d2ffce8680d176a328286411e7.exe
Resource
win10v2004-20230220-en
General
-
Target
e164802c98bccc8d0c2803f2de7b351ab27f55d2ffce8680d176a328286411e7.exe
-
Size
410KB
-
MD5
b42fe381e8a6f73f3a7f4d895793f107
-
SHA1
cfb2b425391bad29f5ac04849d6a5047ca413e20
-
SHA256
e164802c98bccc8d0c2803f2de7b351ab27f55d2ffce8680d176a328286411e7
-
SHA512
63b885262b5318124807d2b1c7847a6e34c80b0faed6d416f8ad9ac9aa125c4b7c1f919771462ffd0d4ab8ba7126b4522c57770da3d32a918f040a7e114179c8
-
SSDEEP
6144:W1rT4amUof/x4RAdwCy6i14L1OOLPub4OPY1fqx:WJThmUofCRbCniepdL2bjPY16
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1728-59-0x0000000000260000-0x000000000027C000-memory.dmp family_rhadamanthys behavioral1/memory/1728-61-0x0000000000260000-0x000000000027C000-memory.dmp family_rhadamanthys behavioral1/memory/1728-62-0x0000000000260000-0x000000000027C000-memory.dmp family_rhadamanthys behavioral1/memory/1728-65-0x0000000000260000-0x000000000027C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.