Analysis
-
max time kernel
153s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 20:26
Static task
static1
Behavioral task
behavioral1
Sample
f0f42ceb1388d5dbd62f7a4f3234cbae.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f0f42ceb1388d5dbd62f7a4f3234cbae.exe
Resource
win10v2004-20230220-en
General
-
Target
f0f42ceb1388d5dbd62f7a4f3234cbae.exe
-
Size
397KB
-
MD5
f0f42ceb1388d5dbd62f7a4f3234cbae
-
SHA1
1da98aecd2cb2271f7b295d4f13a61ee675965c7
-
SHA256
e70d5129aae648f8bc3beb57cffc7f655c0ddd92a810ef9f1e4540b2d4d92c51
-
SHA512
9ee8f81fe12dc37d1c389fd136604e919dd3d306849dd7063dc49c5bc8dfcdeb6e17c3e3c1e1d83caa37b461d2f2211f346d3f5ca444ccc9d41f6399374373a5
-
SSDEEP
6144:IW6ocXcTaZvPbSJfduKXtxxKEBJR1cvcMVYX4mj:IW67caZvj0cKnxFmcMeIQ
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3732-139-0x00000000009A0000-0x00000000009BC000-memory.dmp family_rhadamanthys behavioral2/memory/3732-140-0x00000000009A0000-0x00000000009BC000-memory.dmp family_rhadamanthys behavioral2/memory/3732-143-0x00000000009A0000-0x00000000009BC000-memory.dmp family_rhadamanthys behavioral2/memory/3732-144-0x00000000009A0000-0x00000000009BC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.