General
-
Target
ram.ps1
-
Size
155B
-
Sample
250206-yyyjsavrdw
-
MD5
6a07358a9e4146d50f59090fe0d9ffd6
-
SHA1
51b5ebe903a261ef6dea38c27817b65d4ff77dcc
-
SHA256
a4f0774f5e78135e7efea0b8c887fcb216d4aae11334aaba707a7a42f7f3173d
-
SHA512
6bd54737c4d91905b3955eff3413592da4f9142f1e77da42833449e02301d3882619e8d6708c076b0498919709a1b296648017a27e8b9c015754733188b64eb7
Static task
static1
Behavioral task
behavioral1
Sample
ram.ps1
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ram.ps1
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
ram.ps1
-
Size
155B
-
MD5
6a07358a9e4146d50f59090fe0d9ffd6
-
SHA1
51b5ebe903a261ef6dea38c27817b65d4ff77dcc
-
SHA256
a4f0774f5e78135e7efea0b8c887fcb216d4aae11334aaba707a7a42f7f3173d
-
SHA512
6bd54737c4d91905b3955eff3413592da4f9142f1e77da42833449e02301d3882619e8d6708c076b0498919709a1b296648017a27e8b9c015754733188b64eb7
Score10/10-
Detects Rhadamanthys payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-