Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-05-2023 08:37
Static task
static1
Behavioral task
behavioral1
Sample
84ea78e49b50c839184359817be2d01d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
84ea78e49b50c839184359817be2d01d.exe
Resource
win10v2004-20230220-en
General
-
Target
84ea78e49b50c839184359817be2d01d.exe
-
Size
375KB
-
MD5
84ea78e49b50c839184359817be2d01d
-
SHA1
c83c1e2cb5ab7988765aea3697dab23aa16d42d3
-
SHA256
cba464617c0ab39774135cc89752650e41f8ed3cfc773619995be0267f7570a8
-
SHA512
0aba57438c106e32a4645ad3ddb9ad5a481fd9ab15d288148caf3c7574cad2cbba513b532c15243214925e1d3d7415641058fb5a749f0319d79569f927e14953
-
SSDEEP
6144:W/3ZCBLID/EP5mmj9EN1zj+DMT/omPwl2IVYm:W/3sm/EYWvDsgmPwv
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1488-59-0x00000000002F0000-0x000000000030C000-memory.dmp family_rhadamanthys behavioral1/memory/1488-61-0x00000000002F0000-0x000000000030C000-memory.dmp family_rhadamanthys behavioral1/memory/1488-62-0x00000000002F0000-0x000000000030C000-memory.dmp family_rhadamanthys behavioral1/memory/1488-65-0x00000000002F0000-0x000000000030C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.