General
-
Target
020425c9fc833c6851f81b9db71b47eda800d4ecacc91eb8f3d6ee27b3beff6e
-
Size
78.6MB
-
Sample
240930-wzlv9sshnd
-
MD5
a9d05cdad3fe65155827871bde492212
-
SHA1
9d1bc989b096780822350a3917912eb922f25dd6
-
SHA256
020425c9fc833c6851f81b9db71b47eda800d4ecacc91eb8f3d6ee27b3beff6e
-
SHA512
4772efa008b9a502a06b2338acd70636d21ef021779428cc2e02edd92d47743c8fb0aa1b0b3082f2a5d6d4f3971d1632094c2aa5649df6fb6ef4df8869662cac
-
SSDEEP
1572864:2ZSs15m6LOhdKU+itv+tSU11+ofQZreT6C4pQFSIzAumScqExB:Gj1ZAKU1tvWSU1w6ZTdXFJAftB
Static task
static1
Behavioral task
behavioral1
Sample
020425c9fc833c6851f81b9db71b47eda800d4ecacc91eb8f3d6ee27b3beff6e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
020425c9fc833c6851f81b9db71b47eda800d4ecacc91eb8f3d6ee27b3beff6e.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
020425c9fc833c6851f81b9db71b47eda800d4ecacc91eb8f3d6ee27b3beff6e
-
Size
78.6MB
-
MD5
a9d05cdad3fe65155827871bde492212
-
SHA1
9d1bc989b096780822350a3917912eb922f25dd6
-
SHA256
020425c9fc833c6851f81b9db71b47eda800d4ecacc91eb8f3d6ee27b3beff6e
-
SHA512
4772efa008b9a502a06b2338acd70636d21ef021779428cc2e02edd92d47743c8fb0aa1b0b3082f2a5d6d4f3971d1632094c2aa5649df6fb6ef4df8869662cac
-
SSDEEP
1572864:2ZSs15m6LOhdKU+itv+tSU11+ofQZreT6C4pQFSIzAumScqExB:Gj1ZAKU1tvWSU1w6ZTdXFJAftB
Score10/10-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Event Triggered Execution: Image File Execution Options Injection
-
Sets service image path in registry
-
Uses Session Manager for persistence
Creates Session Manager registry key to run executable early in system boot.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Image File Execution Options Injection
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1