Analysis
-
max time kernel
189s -
max time network
219s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 18:56
Static task
static1
Behavioral task
behavioral1
Sample
ac2e0143f882750bad9863dbbeb0e6e2c9f1076f0deff7d39e24a723492a4988.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ac2e0143f882750bad9863dbbeb0e6e2c9f1076f0deff7d39e24a723492a4988.exe
Resource
win10v2004-20230220-en
General
-
Target
ac2e0143f882750bad9863dbbeb0e6e2c9f1076f0deff7d39e24a723492a4988.exe
-
Size
410KB
-
MD5
6bbe23d9fa50333b9267f68fa02073c4
-
SHA1
39a6435043fd10d8ceb5b8a5cd1d25a7b640aa3d
-
SHA256
ac2e0143f882750bad9863dbbeb0e6e2c9f1076f0deff7d39e24a723492a4988
-
SHA512
700e06e7497ed5e5fb6e6101ad33346b5e255cbefeccf986e1bcc9f63bb1bd7bd82169ca407c4ae50cca0d489c1ce4d5de2b6217efd048c7ac2fd31481942b07
-
SSDEEP
6144:h1J/l9Bm2EfXmgFTl+ZALvXal+OdjGew2+WpiCfq:hP/PBm2EJ5SALCosyewxWAC
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1704-59-0x0000000000270000-0x000000000028C000-memory.dmp family_rhadamanthys behavioral1/memory/1704-60-0x0000000000270000-0x000000000028C000-memory.dmp family_rhadamanthys behavioral1/memory/1704-63-0x0000000000270000-0x000000000028C000-memory.dmp family_rhadamanthys behavioral1/memory/1704-65-0x0000000000270000-0x000000000028C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.