Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
07-05-2023 21:11
Static task
static1
Behavioral task
behavioral1
Sample
9dbcf39905c23fd99583b0605b14218f0bcad230ef0d29dcf5e805b63bb07628.exe
Resource
win10-20230220-en
General
-
Target
9dbcf39905c23fd99583b0605b14218f0bcad230ef0d29dcf5e805b63bb07628.exe
-
Size
375KB
-
MD5
0558faf9b3fe5a9f6c097f1978794615
-
SHA1
27f40940543257751e318c92ed7a42839b03c252
-
SHA256
9dbcf39905c23fd99583b0605b14218f0bcad230ef0d29dcf5e805b63bb07628
-
SHA512
17e2b689d0488bf9fa4cfee9b9543017251b6f9232724fd2dfb48fab6b71f84b5adc188ece0d75254a984da6363b7ddbed9be26dee118e815459570d5a942633
-
SSDEEP
6144:UGoSNLQDx07PqgK3YSlIBvBCrGP7E9HYpOBHUdvrWJY:UG3ux07Pqgm/YMrugHY2U94
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2652-126-0x0000000002470000-0x000000000248C000-memory.dmp family_rhadamanthys behavioral1/memory/2652-127-0x0000000002470000-0x000000000248C000-memory.dmp family_rhadamanthys behavioral1/memory/2652-129-0x0000000002470000-0x000000000248C000-memory.dmp family_rhadamanthys behavioral1/memory/2652-131-0x0000000002470000-0x000000000248C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2652-122-0x00000000008A0000-0x00000000008CE000-memory.dmpFilesize
184KB
-
memory/2652-123-0x0000000000400000-0x00000000006F8000-memory.dmpFilesize
3.0MB
-
memory/2652-126-0x0000000002470000-0x000000000248C000-memory.dmpFilesize
112KB
-
memory/2652-127-0x0000000002470000-0x000000000248C000-memory.dmpFilesize
112KB
-
memory/2652-128-0x0000000000880000-0x0000000000882000-memory.dmpFilesize
8KB
-
memory/2652-129-0x0000000002470000-0x000000000248C000-memory.dmpFilesize
112KB
-
memory/2652-130-0x0000000000400000-0x00000000006F8000-memory.dmpFilesize
3.0MB
-
memory/2652-131-0x0000000002470000-0x000000000248C000-memory.dmpFilesize
112KB