General
-
Target
test.ps1
-
Size
702B
-
Sample
241008-xgw4ysxfmh
-
MD5
b629e4a76638f91a67059188d07e27f6
-
SHA1
42b37211578e971c684b493c8b604874518652e3
-
SHA256
b4dabf844bceeb5b1fa448549735296b4bdf289f346f960228d52a7a09e35ea1
-
SHA512
e11cd5638890756787640c60cd6beaa8a61a6998d1077010da6f0b5f32bd67e176b09d984948cabd68ae2fa6fd9408a44360f0911d93fa205b7821af43b5784c
Static task
static1
Behavioral task
behavioral1
Sample
test.ps1
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
test.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
rhadamanthys
https://147.45.126.71:3752/20846e26ac9fe96c52/8ackhmnt.9e5wm
Targets
-
-
Target
test.ps1
-
Size
702B
-
MD5
b629e4a76638f91a67059188d07e27f6
-
SHA1
42b37211578e971c684b493c8b604874518652e3
-
SHA256
b4dabf844bceeb5b1fa448549735296b4bdf289f346f960228d52a7a09e35ea1
-
SHA512
e11cd5638890756787640c60cd6beaa8a61a6998d1077010da6f0b5f32bd67e176b09d984948cabd68ae2fa6fd9408a44360f0911d93fa205b7821af43b5784c
Score10/10-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-