MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0015157c5bd151f1b5a81a07ccc54b51bf99931155c1f60cf2abaee151495a57. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: 0015157c5bd151f1b5a81a07ccc54b51bf99931155c1f60cf2abaee151495a57
SHA3-384 hash: c59d95c59f416a873dea556b05661ad2813678d555dd6ced53ec850861391d34a8cf6da610681b9df243f1334291e927
SHA1 hash: dca86fcfa131a824ae0e85bbad38567c2b5b3feb
MD5 hash: 812ebc9897be48f84d2d287bdcb5410e
humanhash: green-beer-skylark-alaska
File name:Setup__en.exe
Download: download sample
Signature Rhadamanthys
File size:99'625'834 bytes
First seen:2025-09-23 18:26:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32f3282581436269b3a75b6675fe3e08 (197 x LummaStealer, 123 x Rhadamanthys, 8 x CoinMiner)
ssdeep 24576:1YnNzTxjlLzvFXp5ULpm9CsoQ3lMhCwTlRM5SGeII4HjjcNml59qUEkRtuUPzY/X:+bjdpXIKQQURMc4DjlliUtRtuUE
Threatray 1'009 similar samples on MalwareBazaar
TLSH T1CB282B32A15CF76E3A2275E7F5B1AF00622AE86CF157C73EB702214C9B6D05790653CA
TrID 37.3% (.EXE) Win64 Executable (generic) (10522/11/4)
17.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.9% (.EXE) Win32 Executable (generic) (4504/4/1)
7.3% (.ICL) Windows Icons Library (generic) (2059/9)
7.2% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter aachum
Tags:146-19-49-13 194-213-18-9 45-66-249-28 AutoIT CypherIT exe Rhadamanthys


Avatar
iamaachum
https://n14rr140825e7.cfd/mnllcontent-093147db0d269ab5e9ab6f242bb2f112/dlc_68d2e23c59717/?s=294&pg=0&q=Download =>https://mega.nz/file/fdUC1IKJ#mL3LQfxdAjG18r4HVxz2QDRx73r-gFAIIOcMmMvd3Oc

Intelligence


File Origin
# of uploads :
1
# of downloads :
99
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Setup__en.exe
Verdict:
Malicious activity
Analysis date:
2025-09-23 18:28:23 UTC
Tags:
autoit anti-evasion stealer rhadamanthys

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
autoit emotet cobalt spoof
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a file
Searching for the window
Searching for the Windows task manager window
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Creating a process from a recently created file
Sending a custom TCP request
DNS request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug blackhole expired-cert installer invalid-signature microsoft_visual_cc nsis overlay packed signed
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-09-23T14:54:00Z UTC
Last seen:
2025-09-23T14:54:00Z UTC
Hits:
~10
Result
Threat name:
RHADAMANTHYS
Detection:
malicious
Classification:
troj.evad.spyw
Score:
88 / 100
Signature
AI detected suspicious PE digital signature
Drops PE files with a suspicious file extension
Found direct / indirect Syscall (likely to bypass EDR)
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1782823 Sample: Setup__en.exe Startdate: 23/09/2025 Architecture: WINDOWS Score: 88 34 IYUUYeIdeiZZJbwsrAlWaXcIq.IYUUYeIdeiZZJbwsrAlWaXcIq 2->34 42 Multi AV Scanner detection for submitted file 2->42 44 Yara detected RHADAMANTHYS Stealer 2->44 46 Sigma detected: Search for Antivirus process 2->46 48 2 other signatures 2->48 9 Setup__en.exe 27 2->9         started        signatures3 process4 file5 30 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 9->30 dropped 12 cmd.exe 1 9->12         started        process6 signatures7 56 Drops PE files with a suspicious file extension 12->56 15 cmd.exe 4 12->15         started        18 conhost.exe 12->18         started        process8 file9 32 C:\Users\user\AppData\Local\...\Specs.scr, PE32 15->32 dropped 20 Specs.scr 15->20         started        24 extrac32.exe 14 15->24         started        26 tasklist.exe 1 15->26         started        28 3 other processes 15->28 process10 dnsIp11 36 194.213.18.9, 443, 49696 HA-SDCGB United Kingdom 20->36 38 45.66.249.28, 443, 49693, 49697 FREERANGECLOUDCA Russian Federation 20->38 40 146.19.49.13, 443, 49695 FITC-ASUS France 20->40 50 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 20->50 52 Switches to a custom stack to bypass stack traces 20->52 54 Found direct / indirect Syscall (likely to bypass EDR) 20->54 signatures12
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-09-23 18:32:35 UTC
File Type:
PE (Exe)
Extracted files:
22
AV detection:
16 of 38 (42.11%)
Threat level:
  5/5
Result
Malware family:
rhadamanthys
Score:
  10/10
Tags:
family:rhadamanthys discovery stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Windows directory
Enumerates processes with tasklist
Executes dropped EXE
Loads dropped DLL
Detects Rhadamanthys Payload
Rhadamanthys
Rhadamanthys family
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Malware family:
Rhadamanthys
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Rhadamanthys

Executable exe 0015157c5bd151f1b5a81a07ccc54b51bf99931155c1f60cf2abaee151495a57

(this sample)

  
Delivery method
Distributed via web download

Comments