Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2023 23:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a.exe
Resource
win10-20230220-en
windows10-1703-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
a.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
a.exe
-
Size
979KB
-
MD5
20f70cdf44bd28fc1b1f1dd69c99f22e
-
SHA1
e19928d2871098c4488cf71d54a860a1f6d78a36
-
SHA256
d02711122b130cd44c721437f4f2767b9c61b832fe6e3d35536f745d131d16ff
-
SHA512
858b6acaf44cedf4f1d8660c86a70bf96779658a27ba02aa298faca3ca48063725cb50cc8168180195ff8ac3258e28a2ee9b064352c2b2a55bbeeec1c33cef84
-
SSDEEP
24576:CeGVZ9/e0wilWWC7rD/QTYrpGzaVWWeiZfsPHY:4320uWt4pGmVzZAY
Score
10/10
Malware Config
Extracted
Family
rhadamanthys
C2
http://8002.motorline.pw/api/9wcnem.x0vs
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral2/memory/2180-147-0x0000000001410000-0x000000000142C000-memory.dmp family_rhadamanthys behavioral2/memory/2180-148-0x0000000001410000-0x000000000142C000-memory.dmp family_rhadamanthys behavioral2/memory/2180-150-0x0000000001410000-0x000000000142C000-memory.dmp family_rhadamanthys behavioral2/memory/2180-151-0x0000000001410000-0x000000000142C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3032 set thread context of 2180 3032 a.exe 89 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2180 3032 a.exe 89 PID 3032 wrote to memory of 2180 3032 a.exe 89 PID 3032 wrote to memory of 2180 3032 a.exe 89 PID 3032 wrote to memory of 2180 3032 a.exe 89 PID 3032 wrote to memory of 2180 3032 a.exe 89 PID 3032 wrote to memory of 2180 3032 a.exe 89 PID 3032 wrote to memory of 2180 3032 a.exe 89 PID 3032 wrote to memory of 2180 3032 a.exe 89 PID 3032 wrote to memory of 2180 3032 a.exe 89