Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
07-05-2023 16:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cba464617c0ab39774135cc89752650e41f8ed3cfc773619995be0267f7570a8.exe
Resource
win10-20230220-en
windows10-1703-x64
2 signatures
150 seconds
General
-
Target
cba464617c0ab39774135cc89752650e41f8ed3cfc773619995be0267f7570a8.exe
-
Size
375KB
-
MD5
84ea78e49b50c839184359817be2d01d
-
SHA1
c83c1e2cb5ab7988765aea3697dab23aa16d42d3
-
SHA256
cba464617c0ab39774135cc89752650e41f8ed3cfc773619995be0267f7570a8
-
SHA512
0aba57438c106e32a4645ad3ddb9ad5a481fd9ab15d288148caf3c7574cad2cbba513b532c15243214925e1d3d7415641058fb5a749f0319d79569f927e14953
-
SSDEEP
6144:W/3ZCBLID/EP5mmj9EN1zj+DMT/omPwl2IVYm:W/3sm/EYWvDsgmPwv
Score
10/10
Malware Config
Extracted
Family
rhadamanthys
C2
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1676-126-0x00000000008A0000-0x00000000008BC000-memory.dmp family_rhadamanthys behavioral1/memory/1676-127-0x00000000008A0000-0x00000000008BC000-memory.dmp family_rhadamanthys behavioral1/memory/1676-129-0x00000000008A0000-0x00000000008BC000-memory.dmp family_rhadamanthys behavioral1/memory/1676-131-0x00000000008A0000-0x00000000008BC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.