Analysis
-
max time kernel
154s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 12:33
Static task
static1
Behavioral task
behavioral1
Sample
203b02d84f569302d42f5eedd2293249.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
203b02d84f569302d42f5eedd2293249.exe
Resource
win10v2004-20230221-en
General
-
Target
203b02d84f569302d42f5eedd2293249.exe
-
Size
380KB
-
MD5
203b02d84f569302d42f5eedd2293249
-
SHA1
637be60134a9dc2b9e6ae5537e113a68260918ff
-
SHA256
f50d0f3ff38f7407ab1313ab14067fb3912b810147c265fefd1a9651f53b4fd9
-
SHA512
d8b8470f1d909385b95fcb48827ea3926833bef5b2bbfda6071d0e5ed6913ae2c64e691624839ae311ce40788f32cfaf55ce28ca53871a9a3d6bffe3e4f3633e
-
SSDEEP
3072:+t2aR6gCwC7T4nPKIK1G+xCuZwb6LyvUdwkQWXn8qFGsS2nPHTPKD5hudu4UW6xY:ZUAwFP+I0MUdwun8pGMuTWty
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1996-59-0x00000000002F0000-0x000000000030C000-memory.dmp family_rhadamanthys behavioral1/memory/1996-60-0x00000000002F0000-0x000000000030C000-memory.dmp family_rhadamanthys behavioral1/memory/1996-62-0x00000000002F0000-0x000000000030C000-memory.dmp family_rhadamanthys behavioral1/memory/1996-65-0x00000000002F0000-0x000000000030C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.