Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 18:52
Static task
static1
Behavioral task
behavioral1
Sample
a8e87d7549a4726fc92e0e16a2e729df43922be5e45d79974fdb76549f28990c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a8e87d7549a4726fc92e0e16a2e729df43922be5e45d79974fdb76549f28990c.exe
Resource
win10v2004-20230220-en
General
-
Target
a8e87d7549a4726fc92e0e16a2e729df43922be5e45d79974fdb76549f28990c.exe
-
Size
304KB
-
MD5
70eb3c01cbff3c29a9548843e261efb4
-
SHA1
98dfe747571c47babdb1ec04c2fe37e8e55e5fdc
-
SHA256
a8e87d7549a4726fc92e0e16a2e729df43922be5e45d79974fdb76549f28990c
-
SHA512
73067e707d9a0e4dbaf110bfdca6b91ea406a0f3016c4c181634762a38fcbffdabb7b01c9ee9df2295cc05f05536a3c8a58127c60216769836542645667b4557
-
SSDEEP
6144:IeTss34fUd0AAYtDvyGimRHxNfJ1jFKwuBA:IeTp348d0geGbRLJVFKw
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1704-60-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/1704-62-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/1704-65-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.