Analysis
-
max time kernel
192s -
max time network
239s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 18:50
Static task
static1
Behavioral task
behavioral1
Sample
e1da569f3b8909fc2c03f2c982ea8170cd9b1a3274f137e12aa2d14b69cfd7cc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e1da569f3b8909fc2c03f2c982ea8170cd9b1a3274f137e12aa2d14b69cfd7cc.exe
Resource
win10v2004-20230221-en
General
-
Target
e1da569f3b8909fc2c03f2c982ea8170cd9b1a3274f137e12aa2d14b69cfd7cc.exe
-
Size
374KB
-
MD5
c42b976a0ac5f2f03869cf9df592c1d0
-
SHA1
b5f4dcd0c6d629d496746701d39f60e3e9438e00
-
SHA256
e1da569f3b8909fc2c03f2c982ea8170cd9b1a3274f137e12aa2d14b69cfd7cc
-
SHA512
6ce44264ad359061cfa6e92c615ecdfdd12c9897553535e8a8e412bea0238d414cf6f7a7a7bd2c5db2fba355c32b0bb938b7a72d072f498e54b9f81fc9be6dc4
-
SSDEEP
6144:Rh4I/V6nwfQd90jJey/t9iR9geTLRhTtPY12+yB0dR:Rhv/V6nwfQdKjQyFMR9geTLRhTtf+a
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2456-138-0x0000000000AD0000-0x0000000000AEC000-memory.dmp family_rhadamanthys behavioral2/memory/2456-139-0x0000000000AD0000-0x0000000000AEC000-memory.dmp family_rhadamanthys behavioral2/memory/2456-140-0x0000000000AD0000-0x0000000000AEC000-memory.dmp family_rhadamanthys behavioral2/memory/2456-142-0x0000000000AD0000-0x0000000000AEC000-memory.dmp family_rhadamanthys behavioral2/memory/2456-143-0x0000000000AD0000-0x0000000000AEC000-memory.dmp family_rhadamanthys behavioral2/memory/2456-144-0x0000000000AD0000-0x0000000000AEC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.