Analysis

  • max time kernel
    159s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 20:29

General

  • Target

    f3f0dcb4aee8f5db71a89d30867c9c053831492595089b2bf1c30bac75734d10.exe

  • Size

    303KB

  • MD5

    22980d16c9e2158fc28d03e34f92b7c7

  • SHA1

    4b599ebd237d9f21df47ef1b8d7ffeaa1ba03508

  • SHA256

    f3f0dcb4aee8f5db71a89d30867c9c053831492595089b2bf1c30bac75734d10

  • SHA512

    d721d24c7195c5cf7a7f9fe409b23d75277afc20dbfa93a05a64017395b581ef1b404ac613bb1839bd20ffb957d8395bb7313a4116ae1972a0f69c1aafa857a2

  • SSDEEP

    6144:l4SsftAo3n+T4C5KjQpZj7aVYHzLcD4GlZNjfCNv:lQAo3+xP7lHz4D4G3ZCN

Score
10/10

Malware Config

Extracted

Family

rhadamanthys

C2

http://179.43.142.201/img/favicon.png

Signatures

  • Detect rhadamanthys stealer shellcode 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3f0dcb4aee8f5db71a89d30867c9c053831492595089b2bf1c30bac75734d10.exe
    "C:\Users\Admin\AppData\Local\Temp\f3f0dcb4aee8f5db71a89d30867c9c053831492595089b2bf1c30bac75734d10.exe"
    1⤵
      PID:2496

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2496-134-0x0000000002070000-0x000000000209E000-memory.dmp
      Filesize

      184KB

    • memory/2496-135-0x0000000000400000-0x0000000000460000-memory.dmp
      Filesize

      384KB

    • memory/2496-138-0x00000000007B0000-0x00000000007CC000-memory.dmp
      Filesize

      112KB

    • memory/2496-139-0x00000000020A0000-0x00000000020BA000-memory.dmp
      Filesize

      104KB

    • memory/2496-140-0x00000000007B0000-0x00000000007CC000-memory.dmp
      Filesize

      112KB

    • memory/2496-141-0x00000000007B0000-0x00000000007CC000-memory.dmp
      Filesize

      112KB

    • memory/2496-142-0x0000000000400000-0x0000000000460000-memory.dmp
      Filesize

      384KB

    • memory/2496-143-0x00000000007B0000-0x00000000007CC000-memory.dmp
      Filesize

      112KB

    • memory/2496-144-0x00000000020A0000-0x00000000020BA000-memory.dmp
      Filesize

      104KB