Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04-05-2023 12:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
98bdf6c6506d42ef1e1cc3fecbbd367fa82de45a1ca35e50847c9943a8d4e6fd.exe
Resource
win10-20230220-en
windows10-1703-x64
2 signatures
150 seconds
General
-
Target
98bdf6c6506d42ef1e1cc3fecbbd367fa82de45a1ca35e50847c9943a8d4e6fd.exe
-
Size
382KB
-
MD5
ebc163a4f7a0d7ba6daa378fd483d8df
-
SHA1
e56524fd612b95eba7e7843770832cdd2c237a67
-
SHA256
98bdf6c6506d42ef1e1cc3fecbbd367fa82de45a1ca35e50847c9943a8d4e6fd
-
SHA512
3f57cebc261aa7a2ad0944ec5f9c7d912f8739945c03542ed5a066d89c2d3cff06267298048b0eca32b6c0a5b0243671257e496b44f02720a0cbd6ba64165e01
-
SSDEEP
6144:rd3qjyhPXX5j9FDtPS5R/46jgQc5S84Ut:xajyhPZrtPEfgQc5p4e
Score
10/10
Malware Config
Extracted
Family
rhadamanthys
C2
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/4604-124-0x00000000001E0000-0x00000000001FC000-memory.dmp family_rhadamanthys behavioral1/memory/4604-125-0x00000000001E0000-0x00000000001FC000-memory.dmp family_rhadamanthys behavioral1/memory/4604-127-0x00000000001E0000-0x00000000001FC000-memory.dmp family_rhadamanthys behavioral1/memory/4604-129-0x00000000001E0000-0x00000000001FC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.