General
-
Target
680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b
-
Size
3.2MB
-
Sample
230525-nxbzaahe92
-
MD5
af19789d0289ff3e415dd28e6cfa4a92
-
SHA1
c71c49ddc98dea032688c80d253e36efc3541bbc
-
SHA256
680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b
-
SHA512
730ee3b6f37b39dbab89d4f4861c420c46f353f00a6065e0b681214bf6e7d0af34eb60e5d2c743a2570a70e2e7d090ca4a7a705c71c97d8eff6f555cf6152972
-
SSDEEP
49152:meAQahgmy5H5xwSc3qAfWgKn7YtXT8kNEWQ8htSYJF5RnRmMEv9gvB/R6GnpBTeJ:mxO5O3qAfWgKnQwMZQ8/rrR8v9Q7FCyQ
Static task
static1
Behavioral task
behavioral1
Sample
680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe
Resource
win10-20230915-en
Malware Config
Extracted
bitrat
1.38
179.43.142.55:1995
-
communication_password
a76d949640a165da25ccfe9a8fd82c8a
-
tor_process
tor
Extracted
rhadamanthys
http://163.123.142.243/lekamapopo/6bw0pk.h5m8
Targets
-
-
Target
680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b
-
Size
3.2MB
-
MD5
af19789d0289ff3e415dd28e6cfa4a92
-
SHA1
c71c49ddc98dea032688c80d253e36efc3541bbc
-
SHA256
680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b
-
SHA512
730ee3b6f37b39dbab89d4f4861c420c46f353f00a6065e0b681214bf6e7d0af34eb60e5d2c743a2570a70e2e7d090ca4a7a705c71c97d8eff6f555cf6152972
-
SSDEEP
49152:meAQahgmy5H5xwSc3qAfWgKn7YtXT8kNEWQ8htSYJF5RnRmMEv9gvB/R6GnpBTeJ:mxO5O3qAfWgKnQwMZQ8/rrR8v9Q7FCyQ
Score10/10-
Detect rhadamanthys stealer shellcode
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-