General
-
Target
https://camo.githubusercontent.com/a6d934a02b33785e2abe8020127a0889b22b2beb9462ec75c61e1546959d2a20/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f446f776e6c6f61642d536f6c6172612532304578656375746f722d626c756576696f6c6574
-
Sample
240901-2pqz5avcqb
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://camo.githubusercontent.com/a6d934a02b33785e2abe8020127a0889b22b2beb9462ec75c61e1546959d2a20/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f446f776e6c6f61642d536f6c6172612532304578656375746f722d626c756576696f6c6574
Resource
win10v2004-20240802-en
Malware Config
Extracted
rhadamanthys
https://144.76.133.166:8034/5502b8a765a7d7349/k5851jfq.guti6
Targets
-
-
Target
https://camo.githubusercontent.com/a6d934a02b33785e2abe8020127a0889b22b2beb9462ec75c61e1546959d2a20/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f446f776e6c6f61642d536f6c6172612532304578656375746f722d626c756576696f6c6574
Score10/10-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-