Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 11:43
Static task
static1
Behavioral task
behavioral1
Sample
4e98115b5fba13ab772a232e8c454490e7e76df4c844bf02b176635aa737c87f.exe
Resource
win10v2004-20230220-en
General
-
Target
4e98115b5fba13ab772a232e8c454490e7e76df4c844bf02b176635aa737c87f.exe
-
Size
376KB
-
MD5
5e3558efaf755dbc07a8a4b1105cf848
-
SHA1
ab6a0aaa0b197530d95af81ccb9f34f6d9806e23
-
SHA256
4e98115b5fba13ab772a232e8c454490e7e76df4c844bf02b176635aa737c87f
-
SHA512
a855300223676b1fca457c3a301431e67766ffadceb07acd2bec3bf19aeeb359d151fed20925331fb4b0da19d435d31ff260caa019522f6be3de58ed2e3c1208
-
SSDEEP
6144:ERCLN4L9qXS0Ovke1ffCqCD5bk50iNTJ1AsxB84Mk+:ERCuMXfOvkGCqabqFJfm
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1664-138-0x0000000002480000-0x000000000249C000-memory.dmp family_rhadamanthys behavioral1/memory/1664-139-0x0000000002480000-0x000000000249C000-memory.dmp family_rhadamanthys behavioral1/memory/1664-141-0x0000000002480000-0x000000000249C000-memory.dmp family_rhadamanthys behavioral1/memory/1664-143-0x0000000002480000-0x000000000249C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.