Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04-05-2023 22:50
Static task
static1
Behavioral task
behavioral1
Sample
f50d0f3ff38f7407ab1313ab14067fb3912b810147c265fefd1a9651f53b4fd9.exe
Resource
win10-20230220-en
General
-
Target
f50d0f3ff38f7407ab1313ab14067fb3912b810147c265fefd1a9651f53b4fd9.exe
-
Size
380KB
-
MD5
203b02d84f569302d42f5eedd2293249
-
SHA1
637be60134a9dc2b9e6ae5537e113a68260918ff
-
SHA256
f50d0f3ff38f7407ab1313ab14067fb3912b810147c265fefd1a9651f53b4fd9
-
SHA512
d8b8470f1d909385b95fcb48827ea3926833bef5b2bbfda6071d0e5ed6913ae2c64e691624839ae311ce40788f32cfaf55ce28ca53871a9a3d6bffe3e4f3633e
-
SSDEEP
3072:+t2aR6gCwC7T4nPKIK1G+xCuZwb6LyvUdwkQWXn8qFGsS2nPHTPKD5hudu4UW6xY:ZUAwFP+I0MUdwun8pGMuTWty
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/3496-122-0x0000000000890000-0x00000000008AC000-memory.dmp family_rhadamanthys behavioral1/memory/3496-123-0x0000000000890000-0x00000000008AC000-memory.dmp family_rhadamanthys behavioral1/memory/3496-125-0x0000000000890000-0x00000000008AC000-memory.dmp family_rhadamanthys behavioral1/memory/3496-127-0x0000000000890000-0x00000000008AC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.