Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-05-2023 08:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
848b2eb85051668a7b0f4bf4d7af471b2abaa287464bd6b913f78280bdae2fa0.exe
Resource
win10-20230220-en
windows10-1703-x64
2 signatures
150 seconds
General
-
Target
848b2eb85051668a7b0f4bf4d7af471b2abaa287464bd6b913f78280bdae2fa0.exe
-
Size
304KB
-
MD5
20435c33edf8f7fdaedf61ab1be9730e
-
SHA1
42779f74355905fa0a0c28a6cdc86fc8d2094f18
-
SHA256
848b2eb85051668a7b0f4bf4d7af471b2abaa287464bd6b913f78280bdae2fa0
-
SHA512
93279a6f1c906e5746c692111a80723fd181c67edcd8c5d3f24eb32a6f71160f856b12ccf20c87b34d137f3d7da651d85fee61151909feb2255417074619c382
-
SSDEEP
6144:d5eJ8UcE8f/aRaouv0zGsV8dEV7HVGIY1kS:d5eJbcE8f/H8MEVb4IW
Score
10/10
Malware Config
Extracted
Family
rhadamanthys
C2
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/4148-121-0x0000000000870000-0x000000000088C000-memory.dmp family_rhadamanthys behavioral1/memory/4148-122-0x0000000000870000-0x000000000088C000-memory.dmp family_rhadamanthys behavioral1/memory/4148-124-0x0000000000870000-0x000000000088C000-memory.dmp family_rhadamanthys behavioral1/memory/4148-126-0x0000000000870000-0x000000000088C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.