Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 12:29
Static task
static1
Behavioral task
behavioral1
Sample
670a203a7df0a928e57047e895501a78.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
670a203a7df0a928e57047e895501a78.exe
Resource
win10v2004-20230221-en
General
-
Target
670a203a7df0a928e57047e895501a78.exe
-
Size
335KB
-
MD5
670a203a7df0a928e57047e895501a78
-
SHA1
8efa129a7cf8a34aabaaa41f1f4cb5996b3f75da
-
SHA256
0bb7a4e89ff0c6762fdac3b19a15b1b16efd6f063097c82dfce9642ccb0732e3
-
SHA512
c589e16ccb9caa4324e9f0675f50d9b703abefca1b1650dad3486ae320cbea1da5133676c838e4b070a34a9e9bc165d63d76e32f34946991cc5746f46d6a09ff
-
SSDEEP
6144:SI7XXJdlU5yEeLSgDzJQDzhfg6PqEDbCS8cu16tkNol:77nJdlUkEiDWDhgkCcavNC
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1748-59-0x00000000002D0000-0x00000000002EC000-memory.dmp family_rhadamanthys behavioral1/memory/1748-61-0x00000000002D0000-0x00000000002EC000-memory.dmp family_rhadamanthys behavioral1/memory/1748-62-0x00000000002D0000-0x00000000002EC000-memory.dmp family_rhadamanthys behavioral1/memory/1748-65-0x00000000002D0000-0x00000000002EC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.