Analysis
-
max time kernel
148s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 20:24
Static task
static1
Behavioral task
behavioral1
Sample
ef4a67b340f9516a6c0522fb3ea6d3ce.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ef4a67b340f9516a6c0522fb3ea6d3ce.exe
Resource
win10v2004-20230220-en
General
-
Target
ef4a67b340f9516a6c0522fb3ea6d3ce.exe
-
Size
354KB
-
MD5
ef4a67b340f9516a6c0522fb3ea6d3ce
-
SHA1
51a17cd3e3a45456c91cf6d7245ecfc7b7579c48
-
SHA256
9965b1d2226f47e2a8387830b2773ce026f41d202f0dab87a782158378c5c13e
-
SHA512
ac9d35b76b991e90b34b0651acda65b18579868138efb4a98676869109465556f0712b157e8bbe5971cfafdf09e2d4340d9386a7eee6c6f7e4ad3bf865f78956
-
SSDEEP
6144:wLwh55Mc5K05Uquzpj/COBLPzovi1dNSlU1g:Wwh5u2KUUVr7BX/1dN
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4740-138-0x00000000021E0000-0x00000000021FC000-memory.dmp family_rhadamanthys behavioral2/memory/4740-139-0x00000000021E0000-0x00000000021FC000-memory.dmp family_rhadamanthys behavioral2/memory/4740-142-0x00000000021E0000-0x00000000021FC000-memory.dmp family_rhadamanthys behavioral2/memory/4740-143-0x00000000021E0000-0x00000000021FC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.