Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10/05/2023, 23:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a.exe
Resource
win10-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
a.exe
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
a.exe
-
Size
979KB
-
MD5
20f70cdf44bd28fc1b1f1dd69c99f22e
-
SHA1
e19928d2871098c4488cf71d54a860a1f6d78a36
-
SHA256
d02711122b130cd44c721437f4f2767b9c61b832fe6e3d35536f745d131d16ff
-
SHA512
858b6acaf44cedf4f1d8660c86a70bf96779658a27ba02aa298faca3ca48063725cb50cc8168180195ff8ac3258e28a2ee9b064352c2b2a55bbeeec1c33cef84
-
SSDEEP
24576:CeGVZ9/e0wilWWC7rD/QTYrpGzaVWWeiZfsPHY:4320uWt4pGmVzZAY
Score
10/10
Malware Config
Extracted
Family
rhadamanthys
C2
http://8002.motorline.pw/api/9wcnem.x0vs
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral1/memory/3492-137-0x0000000001540000-0x000000000155C000-memory.dmp family_rhadamanthys behavioral1/memory/3492-138-0x0000000001540000-0x000000000155C000-memory.dmp family_rhadamanthys behavioral1/memory/3492-140-0x0000000001540000-0x000000000155C000-memory.dmp family_rhadamanthys behavioral1/memory/3492-141-0x0000000001540000-0x000000000155C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2788 set thread context of 3492 2788 a.exe 66 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2788 wrote to memory of 3492 2788 a.exe 66 PID 2788 wrote to memory of 3492 2788 a.exe 66 PID 2788 wrote to memory of 3492 2788 a.exe 66 PID 2788 wrote to memory of 3492 2788 a.exe 66 PID 2788 wrote to memory of 3492 2788 a.exe 66 PID 2788 wrote to memory of 3492 2788 a.exe 66 PID 2788 wrote to memory of 3492 2788 a.exe 66 PID 2788 wrote to memory of 3492 2788 a.exe 66 PID 2788 wrote to memory of 3492 2788 a.exe 66