Analysis
-
max time kernel
183s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 22:13
Static task
static1
Behavioral task
behavioral1
Sample
3b33d9480f3dcbcbcf663c6c66acb149ac118cd8cbef1a2603715b9df6b21551.exe
Resource
win10v2004-20230220-en
General
-
Target
3b33d9480f3dcbcbcf663c6c66acb149ac118cd8cbef1a2603715b9df6b21551.exe
-
Size
370KB
-
MD5
05c7aef3bfef4d322efbca5c0cd94669
-
SHA1
0f1f6ed446e23551c38db12a5d61a81fe9329242
-
SHA256
3b33d9480f3dcbcbcf663c6c66acb149ac118cd8cbef1a2603715b9df6b21551
-
SHA512
7763c6ad293d6a4b9656cc4b68b6ace5dd55cc79f8c788907a86253b5b70d312e60ef443874a6c25c2f74c3a048300bf348599f0d2105f36f43d65be5fe6e808
-
SSDEEP
6144:stCzj7OQfLG0yRGR8uLDa9PewOUrk8kIinVHuxsZWL:Ss7OQfLcGR8UGdHFiH6TL
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/4116-138-0x0000000000880000-0x000000000089C000-memory.dmp family_rhadamanthys behavioral1/memory/4116-141-0x0000000000880000-0x000000000089C000-memory.dmp family_rhadamanthys behavioral1/memory/4116-142-0x0000000000880000-0x000000000089C000-memory.dmp family_rhadamanthys behavioral1/memory/4116-144-0x0000000000880000-0x000000000089C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.