General
-
Target
1054966a50aba444beae4b81c8531c78bffb2bce45fd47ba4c37fe092d4ca6ae
-
Size
6.2MB
-
Sample
240830-m93gbssdmn
-
MD5
c20df1e11a2f0844d1e849779fc34742
-
SHA1
70e896c048d1a5478aa13296ef6fc786dfaee88c
-
SHA256
1054966a50aba444beae4b81c8531c78bffb2bce45fd47ba4c37fe092d4ca6ae
-
SHA512
6f4bc9fff666ca26b7227c969b4cf94c0b091e2ddb9ea608ae9010b55634f646a9a5ea7ac75ec2ec3d66552591add4c67bcd7db2f92f5f92a477eafefa674ac5
-
SSDEEP
196608:+p9ZAORSyAvEOL/+8Tekq6rQwnDeiGXeU7e0:+p95ScOq8TPqEo
Static task
static1
Behavioral task
behavioral1
Sample
1054966a50aba444beae4b81c8531c78bffb2bce45fd47ba4c37fe092d4ca6ae.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
1054966a50aba444beae4b81c8531c78bffb2bce45fd47ba4c37fe092d4ca6ae.exe
Resource
win11-20240802-en
Malware Config
Extracted
rhadamanthys
https://154.216.19.149:2047/888260cc6af8f/x32j9k7e.8c8s5
Targets
-
-
Target
1054966a50aba444beae4b81c8531c78bffb2bce45fd47ba4c37fe092d4ca6ae
-
Size
6.2MB
-
MD5
c20df1e11a2f0844d1e849779fc34742
-
SHA1
70e896c048d1a5478aa13296ef6fc786dfaee88c
-
SHA256
1054966a50aba444beae4b81c8531c78bffb2bce45fd47ba4c37fe092d4ca6ae
-
SHA512
6f4bc9fff666ca26b7227c969b4cf94c0b091e2ddb9ea608ae9010b55634f646a9a5ea7ac75ec2ec3d66552591add4c67bcd7db2f92f5f92a477eafefa674ac5
-
SSDEEP
196608:+p9ZAORSyAvEOL/+8Tekq6rQwnDeiGXeU7e0:+p95ScOq8TPqEo
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-