Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06-05-2023 13:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
032e861138d0a304d5a51bc7614f867b04d558596be03cf69ff9fd63098bc46d.exe
Resource
win10-20230220-en
windows10-1703-x64
2 signatures
150 seconds
General
-
Target
032e861138d0a304d5a51bc7614f867b04d558596be03cf69ff9fd63098bc46d.exe
-
Size
365KB
-
MD5
0bf4802d6222aa624709e90092916233
-
SHA1
1434523ea8f30bfdd051570badb258f36c8eaa05
-
SHA256
032e861138d0a304d5a51bc7614f867b04d558596be03cf69ff9fd63098bc46d
-
SHA512
1cb68f4591bc40ba544cc2fa19fa9aaa59e6a497d075b85f2c3dd47f601745d1f500ef9a4286ebd32dc12880529ce850656382c95f7ac060e70c7e89686490c7
-
SSDEEP
6144:98Q7t/ifdZQR1u4U3QScXaviBoGnGoTCOhwK:mS/if6VScXaaagCzK
Score
10/10
Malware Config
Extracted
Family
rhadamanthys
C2
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/5044-125-0x0000000000770000-0x000000000078C000-memory.dmp family_rhadamanthys behavioral1/memory/5044-126-0x0000000000770000-0x000000000078C000-memory.dmp family_rhadamanthys behavioral1/memory/5044-128-0x0000000000770000-0x000000000078C000-memory.dmp family_rhadamanthys behavioral1/memory/5044-130-0x0000000000770000-0x000000000078C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.