Analysis

  • max time kernel
    139s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-10-2024 23:31

General

  • Target

    9a3656d06f5690240cda3cf27bfd3ac1c75f5db3c762b7ff034405a013c51d0b.exe

  • Size

    10.0MB

  • MD5

    5328ec65d2aeaabf5297696d74e9381e

  • SHA1

    08b387ad9c589b7526ab2d1a46ad0457289806b0

  • SHA256

    9a3656d06f5690240cda3cf27bfd3ac1c75f5db3c762b7ff034405a013c51d0b

  • SHA512

    e5ecaa7c485bf6bddc83c1590c425482a05e69f8d72f24af7013484a6d2ba5c61de7ebb3c2ad35b43f8f5b6167f4e7f965c4badb675e099e89c307efcd134c21

  • SSDEEP

    196608:uReP2VyKkh9aprfvVt+4k3X/bbX/fh67kG5egtwAZArSt3CbCjrafmT7qpE710BW:uReus/raprlt+RfX/5YleowLbCjrauTT

Malware Config

Extracted

Family

rhadamanthys

C2

https://89.208.103.86:8537/f6e80fbec866c8b43/DELand

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a3656d06f5690240cda3cf27bfd3ac1c75f5db3c762b7ff034405a013c51d0b.exe
    "C:\Users\Admin\AppData\Local\Temp\9a3656d06f5690240cda3cf27bfd3ac1c75f5db3c762b7ff034405a013c51d0b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3668-0-0x00000000013E0000-0x000000000145E000-memory.dmp

    Filesize

    504KB

  • memory/3668-1-0x00000000013E0000-0x000000000145E000-memory.dmp

    Filesize

    504KB