Analysis

  • max time kernel
    93s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-09-2024 02:00

General

  • Target

    eaede80aa7400cd537e6a02385b397f38e76884b4d2122f05e7e6f021846f6a6.exe

  • Size

    423KB

  • MD5

    efafd49d27ce664d21d621756bf42d1c

  • SHA1

    36928e9cf95b4268a9674d1100dbfe346ee8e803

  • SHA256

    eaede80aa7400cd537e6a02385b397f38e76884b4d2122f05e7e6f021846f6a6

  • SHA512

    9f582bb59d57f6c7355328545ff8b9b94c5b0ab821293a25279bc64c84a40f17b7291d34a0c416e35a723bf236cb0ea8abac271a75c5735bff1bd768be7a87d5

  • SSDEEP

    6144:YAYM3ZEWqf/qwPF7LR5W8ZJ74zmRiOFBbMh9q/JS63ChNeK06iiRzmi0F9:YWBqf/qq3R5W8ZB4zmRzbaVsViRUF9

Malware Config

Extracted

Family

rhadamanthys

C2

https://deadmunky.nl:3715/b607677f1d5be7bf651f2/sbv1bica.fnis9

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaede80aa7400cd537e6a02385b397f38e76884b4d2122f05e7e6f021846f6a6.exe
    "C:\Users\Admin\AppData\Local\Temp\eaede80aa7400cd537e6a02385b397f38e76884b4d2122f05e7e6f021846f6a6.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/320-0-0x00000000007D0000-0x000000000084E000-memory.dmp

    Filesize

    504KB

  • memory/320-1-0x00000000007D0000-0x000000000084E000-memory.dmp

    Filesize

    504KB