Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 18:53
Static task
static1
Behavioral task
behavioral1
Sample
a9a665f8a6c956b7aaf54175e853fb859d83a397a08d38961aa455b85e2547ed.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a9a665f8a6c956b7aaf54175e853fb859d83a397a08d38961aa455b85e2547ed.exe
Resource
win10v2004-20230220-en
General
-
Target
a9a665f8a6c956b7aaf54175e853fb859d83a397a08d38961aa455b85e2547ed.exe
-
Size
290KB
-
MD5
ede410da99df4c7c777b32b88b0716cb
-
SHA1
ab9c1612f0b8bf29ca6a217593fbfb8d26c6b26a
-
SHA256
a9a665f8a6c956b7aaf54175e853fb859d83a397a08d38961aa455b85e2547ed
-
SHA512
85fd480e007a5f86e15f613c7b80ba63dd6cc1bf47e8fd76652ae16c4ba0234ffc257a637fca8bee2ba1b2b8d0a81bd615e709ac5b9edca5e365f31e645e8045
-
SSDEEP
6144:myjXJI9pIwdnmPJxtTDp4Rp6FF0Abo9f/nLs:myjX6wwIPJH22Nban
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2036-59-0x0000000000260000-0x000000000027C000-memory.dmp family_rhadamanthys behavioral1/memory/2036-61-0x0000000000260000-0x000000000027C000-memory.dmp family_rhadamanthys behavioral1/memory/2036-62-0x0000000000260000-0x000000000027C000-memory.dmp family_rhadamanthys behavioral1/memory/2036-65-0x0000000000260000-0x000000000027C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.