General

  • Target

    Rhadamanthys-Stealer.zip

  • Size

    34.9MB

  • Sample

    241221-vdz1bstlat

  • MD5

    9f0947e318eeb5399f55923812dbf34a

  • SHA1

    a62d474856ce4cd980a9982678da8e9690bc8462

  • SHA256

    0290d4aee649a4df20e676b1cd15e41303e73a60e6469468eba79705f469fa9f

  • SHA512

    a8d0a293bbf0c38769c5b12a89f4b20a37989b477b7128c9c49e64ff1f27801250b9a9b45670c151cba5c648666d939595b3aa72f0412e956f7a17a6019203ed

  • SSDEEP

    786432:alnGHgIepEZaE5U+16Nkh6apC2tGBtwik8OjHqTxaq4LYXEY:alGHBO+kGQffBKh8OLqYW/

Malware Config

Targets

    • Target

      Rhadamanthys-Stealer.zip

    • Size

      34.9MB

    • MD5

      9f0947e318eeb5399f55923812dbf34a

    • SHA1

      a62d474856ce4cd980a9982678da8e9690bc8462

    • SHA256

      0290d4aee649a4df20e676b1cd15e41303e73a60e6469468eba79705f469fa9f

    • SHA512

      a8d0a293bbf0c38769c5b12a89f4b20a37989b477b7128c9c49e64ff1f27801250b9a9b45670c151cba5c648666d939595b3aa72f0412e956f7a17a6019203ed

    • SSDEEP

      786432:alnGHgIepEZaE5U+16Nkh6apC2tGBtwik8OjHqTxaq4LYXEY:alGHBO+kGQffBKh8OLqYW/

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Executes dropped EXE

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks