Analysis
-
max time kernel
170s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 12:29
Static task
static1
Behavioral task
behavioral1
Sample
670a203a7df0a928e57047e895501a78.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
670a203a7df0a928e57047e895501a78.exe
Resource
win10v2004-20230221-en
General
-
Target
670a203a7df0a928e57047e895501a78.exe
-
Size
335KB
-
MD5
670a203a7df0a928e57047e895501a78
-
SHA1
8efa129a7cf8a34aabaaa41f1f4cb5996b3f75da
-
SHA256
0bb7a4e89ff0c6762fdac3b19a15b1b16efd6f063097c82dfce9642ccb0732e3
-
SHA512
c589e16ccb9caa4324e9f0675f50d9b703abefca1b1650dad3486ae320cbea1da5133676c838e4b070a34a9e9bc165d63d76e32f34946991cc5746f46d6a09ff
-
SSDEEP
6144:SI7XXJdlU5yEeLSgDzJQDzhfg6PqEDbCS8cu16tkNol:77nJdlUkEiDWDhgkCcavNC
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4840-138-0x0000000000970000-0x000000000098C000-memory.dmp family_rhadamanthys behavioral2/memory/4840-140-0x0000000000970000-0x000000000098C000-memory.dmp family_rhadamanthys behavioral2/memory/4840-141-0x0000000000970000-0x000000000098C000-memory.dmp family_rhadamanthys behavioral2/memory/4840-143-0x0000000000970000-0x000000000098C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.