Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 07:31
Static task
static1
Behavioral task
behavioral1
Sample
0bb7a4e89ff0c6762fdac3b19a15b1b16efd6f063097c82dfce9642ccb0732e3.exe
Resource
win10v2004-20230220-en
General
-
Target
0bb7a4e89ff0c6762fdac3b19a15b1b16efd6f063097c82dfce9642ccb0732e3.exe
-
Size
335KB
-
MD5
670a203a7df0a928e57047e895501a78
-
SHA1
8efa129a7cf8a34aabaaa41f1f4cb5996b3f75da
-
SHA256
0bb7a4e89ff0c6762fdac3b19a15b1b16efd6f063097c82dfce9642ccb0732e3
-
SHA512
c589e16ccb9caa4324e9f0675f50d9b703abefca1b1650dad3486ae320cbea1da5133676c838e4b070a34a9e9bc165d63d76e32f34946991cc5746f46d6a09ff
-
SSDEEP
6144:SI7XXJdlU5yEeLSgDzJQDzhfg6PqEDbCS8cu16tkNol:77nJdlUkEiDWDhgkCcavNC
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/4396-139-0x0000000000770000-0x000000000078C000-memory.dmp family_rhadamanthys behavioral1/memory/4396-140-0x0000000000770000-0x000000000078C000-memory.dmp family_rhadamanthys behavioral1/memory/4396-142-0x0000000000770000-0x000000000078C000-memory.dmp family_rhadamanthys behavioral1/memory/4396-144-0x0000000000770000-0x000000000078C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.