MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0f0b5bfab2cecd6095438c8ad3f4a764869fa242d72bc561b9fc3d76257d44be. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 15


Intelligence 15 IOCs YARA 5 File information Comments

SHA256 hash: 0f0b5bfab2cecd6095438c8ad3f4a764869fa242d72bc561b9fc3d76257d44be
SHA3-384 hash: cd38623e713a5e813259b2d0b7b4fd56271defa283542af6c56de9e8c88186c2ecf068af6c69893b6851626b3e859b53
SHA1 hash: c4863fd705a804645d03f423e8c5784e34915c03
MD5 hash: 2de018eaae295b108e903605b7f40be2
humanhash: lactose-don-october-paris
File name:get-soft.exe
Download: download sample
Signature Rhadamanthys
File size:171'520 bytes
First seen:2025-10-02 16:24:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 23aa6ede111f6ac860a5e9008f9b9673 (21 x Rhadamanthys, 4 x DonutLoader, 3 x CoinMiner)
ssdeep 3072:3E3LoiohzgBlfhsoXF2EvKLQYvjj06C6rLqJ/Tb/CiZkHHoqSPQ1jRt:3E3Loioh8BlmWMEvKU4rVqJCHmPW7
TLSH T178F36C4773A420F9E1B7C279C9920A46E7B2782507619BDF03B047BA5F236D09D3EB61
TrID 48.7% (.EXE) Win64 Executable (generic) (10522/11/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter burger
Tags:donutloader exe Rhadamanthys

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
get-soft.exe
Verdict:
No threats detected
Analysis date:
2025-10-02 16:19:36 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
dropper spoof shell sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Running batch commands
Connection attempt
Sending a custom TCP request
Searching for the window
Launching a process
DNS request
Sending a UDP request
Forced system process termination
Connection attempt to an infection source
Launching a file downloaded from the Internet
Launching a tool to kill processes
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 fingerprint microsoft_visual_cc obfuscated
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-10-02T13:30:00Z UTC
Last seen:
2025-10-04T07:16:00Z UTC
Hits:
~100
Result
Threat name:
RHADAMANTHYS, Xmrig
Detection:
malicious
Classification:
troj.expl.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
AI detected malicious Powershell script
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Found API chain indicative of debugger detection
Found API chain indicative of sandbox detection
Found direct / indirect Syscall (likely to bypass EDR)
Found stalling execution ending in API Sleep call
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Potential Crypto Mining Activity
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Xmrig
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected RHADAMANTHYS Stealer
Yara detected UAC Bypass using CMSTP
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1788252 Sample: get-soft.exe Startdate: 02/10/2025 Architecture: WINDOWS Score: 100 92 pool.supportxmr.com 2->92 94 pool-nyc.supportxmr.com 2->94 102 Sigma detected: Xmrig 2->102 104 Suricata IDS alerts for network traffic 2->104 106 Malicious sample detected (through community Yara rule) 2->106 108 10 other signatures 2->108 10 get-soft.exe 17 2->10         started        15 core.exe 2->15         started        17 FolderBP.exe 2 2->17         started        19 2 other processes 2->19 signatures3 process4 dnsIp5 100 176.46.152.62, 49690, 5858 ESTPAKEE Iran (ISLAMIC Republic Of) 10->100 80 C:\Users\user\AppData\Local\...\nbgtpasrg.exe, PE32 10->80 dropped 82 7dbc521760fa460191...rypted_build[1].exe, PE32 10->82 dropped 84 C:\Users\user\AppData\...\dadaasads_new.ps1, ASCII 10->84 dropped 124 Suspicious powershell command line found 10->124 126 Found API chain indicative of debugger detection 10->126 128 Bypasses PowerShell execution policy 10->128 21 nbgtpasrg.exe 16 10->21         started        25 powershell.exe 21 10->25         started        27 taskkill.exe 10->27         started        86 C:\Users\user\AppData\...\audiodgsvc.exe, PE32+ 15->86 dropped 88 C:\Users\user\AppData\...\WinRing0x64.sys, PE32+ 15->88 dropped 130 Uses schtasks.exe or at.exe to add and modify task schedules 15->130 132 Sample is not signed and drops a device driver 15->132 29 audiodgsvc.exe 15->29         started        31 schtasks.exe 15->31         started        33 schtasks.exe 15->33         started        35 conhost.exe 15->35         started        134 Adds a directory exclusion to Windows Defender 17->134 37 powershell.exe 23 17->37         started        39 2 other processes 19->39 file6 signatures7 process8 dnsIp9 96 176.46.152.80 ESTPAKEE Iran (ISLAMIC Republic Of) 21->96 110 Antivirus detection for dropped file 21->110 112 Found stalling execution ending in API Sleep call 21->112 114 Found API chain indicative of sandbox detection 21->114 122 3 other signatures 21->122 41 conhost.exe 21->41         started        116 Found suspicious powershell code related to unpacking or dynamic code loading 25->116 43 AppInstaller.exe 2 25->43         started        46 AppInstaller.exe 25->46         started        48 conhost.exe 25->48         started        98 104.243.43.115 RELIABLESITEUS United States 29->98 118 Query firmware table information (likely to detect VMs) 29->118 50 conhost.exe 31->50         started        52 conhost.exe 33->52         started        120 Loading BitLocker PowerShell Module 37->120 54 conhost.exe 37->54         started        56 WmiPrvSE.exe 37->56         started        signatures10 process11 file12 90 C:\Users\user\AppData\Local\Temp\cmstp.inf, Windows 43->90 dropped 58 cmd.exe 1 43->58         started        60 cmd.exe 43->60         started        62 cmstp.exe 8 7 43->62         started        64 conhost.exe 43->64         started        66 cmd.exe 46->66         started        68 conhost.exe 46->68         started        70 cmstp.exe 46->70         started        72 cmd.exe 46->72         started        process13 process14 74 taskkill.exe 1 58->74         started        76 taskkill.exe 60->76         started        78 taskkill.exe 66->78         started       
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Infostealer.Tinba
Status:
Malicious
First seen:
2025-10-02 16:19:37 UTC
File Type:
PE+ (Exe)
AV detection:
27 of 38 (71.05%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
donut_injector xmrig rhadamanthys unc_loader_071
Similar samples:
Result
Malware family:
rhadamanthys
Score:
  10/10
Tags:
family:donutloader family:rhadamanthys defense_evasion discovery execution loader stealer
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Detects DonutLoader
Detects Rhadamanthys Payload
DonutLoader
Donutloader family
Rhadamanthys
Rhadamanthys family
Unpacked files
SH256 hash:
0f0b5bfab2cecd6095438c8ad3f4a764869fa242d72bc561b9fc3d76257d44be
MD5 hash:
2de018eaae295b108e903605b7f40be2
SHA1 hash:
c4863fd705a804645d03f423e8c5784e34915c03
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments