Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06-05-2023 11:16
Static task
static1
Behavioral task
behavioral1
Sample
fe089626f684e3b39cd624717c6f2abbfedc39516fb0c677bc164a4f73cf6b12.exe
Resource
win10-20230220-en
General
-
Target
fe089626f684e3b39cd624717c6f2abbfedc39516fb0c677bc164a4f73cf6b12.exe
-
Size
364KB
-
MD5
c6f82251741903bd180174a6e2c5598c
-
SHA1
d17a4c01f3b53f79fd610d3571f352a115249d65
-
SHA256
fe089626f684e3b39cd624717c6f2abbfedc39516fb0c677bc164a4f73cf6b12
-
SHA512
6e099750ef9dd26a58f9d56676ae04b9b9a38644e3c13ed9ff6c31b4e9d55273e29745a09336102aa88934a3f89f1c2d3b643eb84b9f813b1dd261132c09334b
-
SSDEEP
6144:f4Gilut5u3rZwRwtw8f7hNGAmY5ZiGsfhFzAdoIb+YK:QGwut5uNgwG8f7vGNA+bAdTNK
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2468-126-0x0000000002300000-0x000000000231C000-memory.dmp family_rhadamanthys behavioral1/memory/2468-127-0x0000000002300000-0x000000000231C000-memory.dmp family_rhadamanthys behavioral1/memory/2468-129-0x0000000002300000-0x000000000231C000-memory.dmp family_rhadamanthys behavioral1/memory/2468-131-0x0000000002300000-0x000000000231C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.