Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04-05-2023 21:54
Static task
static1
Behavioral task
behavioral1
Sample
d4643442e6c7bd86062c146b86962d5f1e1b25536c625a2943505cef171208e4.exe
Resource
win10-20230220-en
General
-
Target
d4643442e6c7bd86062c146b86962d5f1e1b25536c625a2943505cef171208e4.exe
-
Size
380KB
-
MD5
967e369b4527142333aa03052dbe9bca
-
SHA1
bd37ecd4abb8a8554c5daaec032230757e6fcc64
-
SHA256
d4643442e6c7bd86062c146b86962d5f1e1b25536c625a2943505cef171208e4
-
SHA512
8f40be9944eb1f3909f6774eed1dcaf06561707f343c835dc8033ea72b930a244754e4bbc3f55b6fabd3efb7a9798eed19b1e76c0047ea6a699ac139e3de708f
-
SSDEEP
6144:Un1I9F/M6S9NcuYdYh71RNrOtd01mNw8Aw4U5Wyytgr/:81A06S9NcFYR1RsE1/5w4by4I/
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/3452-126-0x0000000002450000-0x000000000246C000-memory.dmp family_rhadamanthys behavioral1/memory/3452-127-0x0000000002450000-0x000000000246C000-memory.dmp family_rhadamanthys behavioral1/memory/3452-129-0x0000000002450000-0x000000000246C000-memory.dmp family_rhadamanthys behavioral1/memory/3452-131-0x0000000002450000-0x000000000246C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.