Analysis
-
max time kernel
165s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 12:29
Static task
static1
Behavioral task
behavioral1
Sample
7a6b8df5d5c2ca7471b0a843be3238c6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7a6b8df5d5c2ca7471b0a843be3238c6.exe
Resource
win10v2004-20230221-en
General
-
Target
7a6b8df5d5c2ca7471b0a843be3238c6.exe
-
Size
335KB
-
MD5
7a6b8df5d5c2ca7471b0a843be3238c6
-
SHA1
631ce6c79051d65f71f307751a21be81495c5cd0
-
SHA256
39aafc25ee39dd9a53280c0059cb7b618dc7ca4cbe79756de58f193255ad380c
-
SHA512
5e04d10c34293701bf8a49a3959eb894c402a4faf53b38d0ff1fd38bcc44dc75c22f379c035e35b6a648954ade13621ab5aa7007db852e6c78e7e0127ff2fc74
-
SSDEEP
6144:ajgYUE6J6FqkJa6BZvRnhAR5Ithc2VjF2e3DQ0x:ajgjE6sFTJainnmR5F2dMYQ0
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/624-59-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/624-60-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/624-62-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/624-65-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.