MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 09774a8fdc58fb31fbd0089b328ada61acee072e9e4137dce49d62544b025535. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 17


Intelligence 17 IOCs YARA 5 File information Comments

SHA256 hash: 09774a8fdc58fb31fbd0089b328ada61acee072e9e4137dce49d62544b025535
SHA3-384 hash: c238311b20419c8d2a1689605be68d4f2c6066e1a0de5c7837fe65b813106e1a5e23f96c12dd77ab7438ec99b3bd025d
SHA1 hash: 22cffe71cbad5739242df3cea95a982bb22ae61c
MD5 hash: 9672ad7032d4deb7550a7e3cbbea1b5c
humanhash: william-robin-hotel-iowa
File name:5.exe
Download: download sample
Signature Rhadamanthys
File size:1'235'968 bytes
First seen:2025-09-06 06:56:51 UTC
Last seen:2025-09-12 04:25:48 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 08a07d9be19d1f329c4ea80bf355ee64 (3 x LummaStealer, 2 x Rhadamanthys, 1 x Stealc)
ssdeep 24576:LtXmI4yB8AHtWaZy3E/sx4jIBoqK+mB3HtA:RXmI4yB8AZrhR73C
TLSH T10D45F125D16561FEE2A640B256098261B532F86387396FFB82F0E7752E0BED40F3E315
TrID 63.5% (.EXE) Win64 Executable (generic) (10522/11/4)
12.2% (.EXE) OS/2 Executable (generic) (2029/13)
12.0% (.EXE) Generic Win/DOS Executable (2002/3)
12.0% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe Rhadamanthys

Intelligence


File Origin
# of uploads :
13
# of downloads :
82
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
670555167ef00ee2001a8049cbce9ae6bbef480a55ad8df606746d3594bf5212.exe
Verdict:
Malicious activity
Analysis date:
2025-09-06 06:03:49 UTC
Tags:
telegram lumma stealer stealc anti-evasion auto-reg rhadamanthys shellcode loader python amadey botnet

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context crypto fingerprint microsoft_visual_cc obfuscated packed packed packer_detected similar-threat
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-09-05T17:36:00Z UTC
Last seen:
2025-09-05T17:36:00Z UTC
Hits:
~10
Detections:
Trojan.Win32.InjectorNetT.cga Trojan.Win32.Inject.sb Trojan.Win32.Crypt.sb PDM:Trojan.Win32.Generic
Result
Threat name:
RHADAMANTHYS
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Changes memory attributes in foreign processes to executable or writable
Creates a thread in another existing process (thread injection)
Early bird code injection technique detected
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1772263 Sample: 5.exe Startdate: 06/09/2025 Architecture: WINDOWS Score: 100 88 time.google.com 2->88 90 time-a-g.nist.gov 2->90 92 8 other IPs or domains 2->92 114 Suricata IDS alerts for network traffic 2->114 116 Malicious sample detected (through community Yara rule) 2->116 118 Multi AV Scanner detection for submitted file 2->118 120 2 other signatures 2->120 13 5.exe 2->13         started        16 msedge.exe 104 375 2->16         started        19 elevation_service.exe 2->19         started        21 3 other processes 2->21 signatures3 process4 dnsIp5 182 Writes to foreign memory regions 13->182 184 Allocates memory in foreign processes 13->184 186 Injects a PE file into a foreign processes 13->186 23 MSBuild.exe 13->23         started        84 192.168.2.9, 443, 49672, 49683 unknown unknown 16->84 86 239.255.255.250 unknown Reserved 16->86 27 msedge.exe 16->27         started        29 msedge.exe 16->29         started        31 msedge.exe 16->31         started        33 2 other processes 16->33 signatures6 process7 dnsIp8 100 62.60.226.146, 49683, 49723, 49729 ASLINE-AS-APASLINELIMITEDHK Iran (ISLAMIC Republic Of) 23->100 148 Found many strings related to Crypto-Wallets (likely being stolen) 23->148 150 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 23->150 152 Switches to a custom stack to bypass stack traces 23->152 154 Found direct / indirect Syscall (likely to bypass EDR) 23->154 35 dllhost.exe 8 23->35         started        40 WerFault.exe 2 23->40         started        102 s-part-0012.t-0009.t-msedge.net 13.107.246.40, 443, 49707, 49721 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 27->102 104 150.171.27.11, 443, 49727 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 27->104 106 9 other IPs or domains 27->106 signatures9 process10 dnsIp11 94 176.46.152.46, 49733, 80 ESTPAKEE Iran (ISLAMIC Republic Of) 35->94 96 time-a-g.nist.gov 129.6.15.28 US-NATIONAL-INSTITUTE-OF-STANDARDS-AND-TECHNOLOGYUS United States 35->96 98 6 other IPs or domains 35->98 80 C:\Users\user\AppData\Local\...\7l0w@A2c8.exe, PE32+ 35->80 dropped 82 C:\Users\user\AppData\Local\...\1}Yt.exe, PE32+ 35->82 dropped 140 Early bird code injection technique detected 35->140 142 Found many strings related to Crypto-Wallets (likely being stolen) 35->142 144 Tries to harvest and steal browser information (history, passwords, etc) 35->144 146 2 other signatures 35->146 42 1}Yt.exe 35->42         started        45 7l0w@A2c8.exe 35->45         started        47 wmpnscfg.exe 35->47         started        49 3 other processes 35->49 file12 signatures13 process14 signatures15 168 Multi AV Scanner detection for dropped file 42->168 170 Sets debug register (to hijack the execution of another thread) 42->170 172 Modifies the context of a thread in another process (thread injection) 42->172 51 1}Yt.exe 42->51         started        174 Injects a PE file into a foreign processes 45->174 55 7l0w@A2c8.exe 45->55         started        176 Writes to foreign memory regions 47->176 178 Allocates memory in foreign processes 47->178 57 dllhost.exe 47->57         started        180 Found many strings related to Crypto-Wallets (likely being stolen) 49->180 59 chrome.exe 49->59         started        62 msedge.exe 49->62         started        64 chrome.exe 49->64         started        process16 dnsIp17 78 C:\Users\user\AppData\Roaming\...\System.exe, PE32+ 51->78 dropped 122 Changes memory attributes in foreign processes to executable or writable 51->122 124 Injects code into the Windows Explorer (explorer.exe) 51->124 126 Writes to foreign memory regions 51->126 66 explorer.exe 51->66 injected 128 Allocates memory in foreign processes 55->128 130 Creates a thread in another existing process (thread injection) 55->130 132 Injects a PE file into a foreign processes 55->132 108 googlehosted.l.googleusercontent.com 142.250.80.1, 443, 49697, 49698 GOOGLEUS United States 59->108 110 127.0.0.1 unknown unknown 59->110 112 clients2.googleusercontent.com 59->112 file18 signatures19 process20 process21 68 System.exe 66->68         started        71 System.exe 66->71         started        signatures22 134 Multi AV Scanner detection for dropped file 68->134 136 Modifies the context of a thread in another process (thread injection) 68->136 138 Injects a PE file into a foreign processes 68->138 73 System.exe 68->73         started        76 System.exe 71->76         started        process23 signatures24 156 Changes memory attributes in foreign processes to executable or writable 73->156 158 Injects code into the Windows Explorer (explorer.exe) 73->158 160 Writes to foreign memory regions 73->160 162 Allocates memory in foreign processes 76->162 164 Creates a thread in another existing process (thread injection) 76->164 166 Injects a PE file into a foreign processes 76->166
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Spyware.Rhadamanthys
Status:
Suspicious
First seen:
2025-09-06 00:58:22 UTC
File Type:
PE+ (Exe)
AV detection:
22 of 38 (57.89%)
Threat level:
  2/5
Result
Malware family:
rhadamanthys
Score:
  10/10
Tags:
family:rhadamanthys stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Detects Rhadamanthys Payload
Rhadamanthys
Rhadamanthys family
Unpacked files
SH256 hash:
09774a8fdc58fb31fbd0089b328ada61acee072e9e4137dce49d62544b025535
MD5 hash:
9672ad7032d4deb7550a7e3cbbea1b5c
SHA1 hash:
22cffe71cbad5739242df3cea95a982bb22ae61c
Malware family:
Rhadamanthys
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Rhadamanthys

Executable exe 09774a8fdc58fb31fbd0089b328ada61acee072e9e4137dce49d62544b025535

(this sample)

  
Delivery method
Distributed via web download

Comments