Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
submitted
01-08-2024 04:23
Static task
static1
Behavioral task
behavioral1
Sample
bd86b97948754903efe08cdb8b90c045e2fd10b6a7be88f94453e2489b2313c3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd86b97948754903efe08cdb8b90c045e2fd10b6a7be88f94453e2489b2313c3.exe
Resource
win10v2004-20240730-en
General
-
Target
bd86b97948754903efe08cdb8b90c045e2fd10b6a7be88f94453e2489b2313c3.exe
-
Size
424KB
-
MD5
c0d3dcfbd7b9aa18dd4a20aeaa6bf7c5
-
SHA1
722589fcc3eaba02dcefcc56d38519f2e5c76dc1
-
SHA256
bd86b97948754903efe08cdb8b90c045e2fd10b6a7be88f94453e2489b2313c3
-
SHA512
99be05bafd2c5fce3c029a70a8f14a1a519c8dff242041a543d2c62c4d119b164d5d400fe3a2fb078330d4662bce97f53370a34340d62a4b767e4250cd830d94
-
SSDEEP
6144:RAYM3ZEWqf/qwPF7LR5W8ZJ74zmRiOFBbMh9q/JSq3ChNeK06iiRzmi0F9:RWBqf/qq3R5W8ZB4zmRzbatsViRUF9
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2664 4884 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bd86b97948754903efe08cdb8b90c045e2fd10b6a7be88f94453e2489b2313c3.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd86b97948754903efe08cdb8b90c045e2fd10b6a7be88f94453e2489b2313c3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd86b97948754903efe08cdb8b90c045e2fd10b6a7be88f94453e2489b2313c3.exe"C:\Users\Admin\AppData\Local\Temp\bd86b97948754903efe08cdb8b90c045e2fd10b6a7be88f94453e2489b2313c3.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 3722⤵
- Program crash
PID:2664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4884 -ip 48841⤵PID:3192