Analysis
-
max time kernel
159s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 20:29
Static task
static1
Behavioral task
behavioral1
Sample
f3f0dcb4aee8f5db71a89d30867c9c053831492595089b2bf1c30bac75734d10.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f3f0dcb4aee8f5db71a89d30867c9c053831492595089b2bf1c30bac75734d10.exe
Resource
win10v2004-20230220-en
General
-
Target
f3f0dcb4aee8f5db71a89d30867c9c053831492595089b2bf1c30bac75734d10.exe
-
Size
303KB
-
MD5
22980d16c9e2158fc28d03e34f92b7c7
-
SHA1
4b599ebd237d9f21df47ef1b8d7ffeaa1ba03508
-
SHA256
f3f0dcb4aee8f5db71a89d30867c9c053831492595089b2bf1c30bac75734d10
-
SHA512
d721d24c7195c5cf7a7f9fe409b23d75277afc20dbfa93a05a64017395b581ef1b404ac613bb1839bd20ffb957d8395bb7313a4116ae1972a0f69c1aafa857a2
-
SSDEEP
6144:l4SsftAo3n+T4C5KjQpZj7aVYHzLcD4GlZNjfCNv:lQAo3+xP7lHz4D4G3ZCN
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2496-138-0x00000000007B0000-0x00000000007CC000-memory.dmp family_rhadamanthys behavioral2/memory/2496-140-0x00000000007B0000-0x00000000007CC000-memory.dmp family_rhadamanthys behavioral2/memory/2496-141-0x00000000007B0000-0x00000000007CC000-memory.dmp family_rhadamanthys behavioral2/memory/2496-143-0x00000000007B0000-0x00000000007CC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.