General
-
Target
start.bat
-
Size
32B
-
Sample
250210-r3qleawjc1
-
MD5
bf24697b5cb868ee7a5ddd4809d45dbc
-
SHA1
716a502d0392c6bbdc770f4146b995575f259373
-
SHA256
6e722243696a6525fe5e873b77f5069fd5c6c7e9147d8a69a13675c67211e892
-
SHA512
91c1f63a4337e19c7009892fe697b476b007e6d554afd5668bfdbb853a0874a6b91567340e87d9c18a58d7b99e059edb61048cf417eff3a7ea02cbfd83771082
Static task
static1
Behavioral task
behavioral1
Sample
start.bat
Resource
win11-20250210-en
Malware Config
Targets
-
-
Target
start.bat
-
Size
32B
-
MD5
bf24697b5cb868ee7a5ddd4809d45dbc
-
SHA1
716a502d0392c6bbdc770f4146b995575f259373
-
SHA256
6e722243696a6525fe5e873b77f5069fd5c6c7e9147d8a69a13675c67211e892
-
SHA512
91c1f63a4337e19c7009892fe697b476b007e6d554afd5668bfdbb853a0874a6b91567340e87d9c18a58d7b99e059edb61048cf417eff3a7ea02cbfd83771082
Score10/10-
Detects Rhadamanthys payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates VirtualBox registry keys
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare services registry key.
-
Suspicious use of SetThreadContext
-