Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05-05-2023 04:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
39aafc25ee39dd9a53280c0059cb7b618dc7ca4cbe79756de58f193255ad380c.exe
Resource
win10-20230220-en
windows10-1703-x64
2 signatures
150 seconds
General
-
Target
39aafc25ee39dd9a53280c0059cb7b618dc7ca4cbe79756de58f193255ad380c.exe
-
Size
335KB
-
MD5
7a6b8df5d5c2ca7471b0a843be3238c6
-
SHA1
631ce6c79051d65f71f307751a21be81495c5cd0
-
SHA256
39aafc25ee39dd9a53280c0059cb7b618dc7ca4cbe79756de58f193255ad380c
-
SHA512
5e04d10c34293701bf8a49a3959eb894c402a4faf53b38d0ff1fd38bcc44dc75c22f379c035e35b6a648954ade13621ab5aa7007db852e6c78e7e0127ff2fc74
-
SSDEEP
6144:ajgYUE6J6FqkJa6BZvRnhAR5Ithc2VjF2e3DQ0x:ajgjE6sFTJainnmR5F2dMYQ0
Score
10/10
Malware Config
Extracted
Family
rhadamanthys
C2
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1608-125-0x0000000000890000-0x00000000008AC000-memory.dmp family_rhadamanthys behavioral1/memory/1608-126-0x0000000000890000-0x00000000008AC000-memory.dmp family_rhadamanthys behavioral1/memory/1608-128-0x0000000000890000-0x00000000008AC000-memory.dmp family_rhadamanthys behavioral1/memory/1608-130-0x0000000000890000-0x00000000008AC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.