Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2023 06:55
Static task
static1
Behavioral task
behavioral1
Sample
f916846ad99f77ebb27edaa95f085566.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f916846ad99f77ebb27edaa95f085566.exe
Resource
win10v2004-20230220-en
General
-
Target
f916846ad99f77ebb27edaa95f085566.exe
-
Size
406KB
-
MD5
f916846ad99f77ebb27edaa95f085566
-
SHA1
ba64567e237d5868e987ac03017d559ab93ab9c7
-
SHA256
597a4ade5d862166430037813118d0e94d993d87490fed195c0ade3fb6ab3e42
-
SHA512
7d45ebc2e7cec9f736099f75ec3e7799b969ced21922fa3e2d3d9ef2ee52006d4450eeb417bd0b8d30b5877c3ea6dd8d66fa3e30e9e6824316ceeb38c8e30722
-
SSDEEP
6144:d+7dSKLUtZrktN4X3/QUTjqWLwt3HuK+NP4:EdSUU4b0PpTj7wJHp+y
Malware Config
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1368-59-0x0000000000230000-0x000000000024C000-memory.dmp family_rhadamanthys behavioral1/memory/1368-61-0x0000000000230000-0x000000000024C000-memory.dmp family_rhadamanthys behavioral1/memory/1368-62-0x0000000000230000-0x000000000024C000-memory.dmp family_rhadamanthys behavioral1/memory/1368-65-0x0000000000230000-0x000000000024C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1368-55-0x00000000002D0000-0x00000000002FE000-memory.dmpFilesize
184KB
-
memory/1368-56-0x0000000000400000-0x00000000006E3000-memory.dmpFilesize
2.9MB
-
memory/1368-60-0x0000000000320000-0x0000000000321000-memory.dmpFilesize
4KB
-
memory/1368-59-0x0000000000230000-0x000000000024C000-memory.dmpFilesize
112KB
-
memory/1368-61-0x0000000000230000-0x000000000024C000-memory.dmpFilesize
112KB
-
memory/1368-62-0x0000000000230000-0x000000000024C000-memory.dmpFilesize
112KB
-
memory/1368-63-0x0000000000400000-0x00000000006E3000-memory.dmpFilesize
2.9MB
-
memory/1368-65-0x0000000000230000-0x000000000024C000-memory.dmpFilesize
112KB