MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1b2a43bd39da50d2811c672a6a46aea4a48693535954534d88a05d278c62edd6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: 1b2a43bd39da50d2811c672a6a46aea4a48693535954534d88a05d278c62edd6
SHA3-384 hash: 74d6ec58336ab3a7e74151acb951a5dbe730e999bef922889ca3a94136708e7b323d389debb74873df00d375c4920dff
SHA1 hash: c0b993d4f67f2bc193173d3863c9423ed5b2a871
MD5 hash: af2dfb4c4a2ff0d0ff1a391d68dac5c7
humanhash: pennsylvania-winner-washington-may
File name:SecuriteInfo.com.Heur.Mint.Zard.31.19838.11785
Download: download sample
Signature Rhadamanthys
File size:5'151'232 bytes
First seen:2025-06-12 04:25:56 UTC
Last seen:2025-06-12 05:27:53 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7d746b91e1e57b358f148ed3374f0079 (41 x Rhadamanthys)
ssdeep 98304:msVfIEAaS5PZ8lrPpfr4qjyo/vfIAA494TNJWqFPiHTN0OV+MWAdGaHHD:RwzaS5xkRfr40LPtWvWqQN5j9GaD
Threatray 143 similar samples on MalwareBazaar
TLSH T1E33633024EBA104EC980F6B45635FBAD35B55E689F41CE5F693CEACB6CBBA804137113
TrID 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.6% (.EXE) Win32 Executable (generic) (4504/4/1)
8.5% (.ICL) Windows Icons Library (generic) (2059/9)
8.3% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter SecuriteInfoCom
Tags:exe Rhadamanthys

Intelligence


File Origin
# of uploads :
2
# of downloads :
679
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Heur.Mint.Zard.31.19838.11785
Verdict:
Malicious activity
Analysis date:
2025-06-12 04:27:15 UTC
Tags:
stealer rhadamanthys shellcode pastebin winring0x64-sys vuln-driver

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
vmprotect mint
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Launching a process
Unauthorized injection to a system process
Result
Threat name:
RHADAMANTHYS
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Creates an undocumented autostart registry key
Deletes itself after installation
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Early bird code injection technique detected
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious execution chain found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes / dynamic malware analysis system (Installed program check)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1712862 Sample: SecuriteInfo.com.Heur.Mint.... Startdate: 12/06/2025 Architecture: WINDOWS Score: 100 94 x.ns.gin.ntt.net 2->94 96 twc.trafficmanager.net 2->96 98 8 other IPs or domains 2->98 124 Multi AV Scanner detection for submitted file 2->124 126 Yara detected RHADAMANTHYS Stealer 2->126 128 .NET source code contains potential unpacker 2->128 130 4 other signatures 2->130 12 SecuriteInfo.com.Heur.Mint.Zard.31.19838.11785.exe 2->12         started        15 cmd.exe 2->15         started        17 elevation_service.exe 2->17         started        19 3 other processes 2->19 signatures3 process4 signatures5 158 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 12->158 160 Switches to a custom stack to bypass stack traces 12->160 21 OpenWith.exe 12->21         started        25 conhost.exe 15->25         started        27 schtasks.exe 15->27         started        29 conhost.exe 17->29         started        process6 dnsIp7 100 180.178.189.34, 49722, 49735, 49736 GALAXY-AS-APGalaxyBroadbandPK Pakistan 21->100 152 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 21->152 154 Deletes itself after installation 21->154 156 Switches to a custom stack to bypass stack traces 21->156 31 OpenWith.exe 5 21->31         started        signatures8 process9 dnsIp10 110 ntp1.net.berkeley.edu 169.229.128.134, 123, 63688 UCBUS United States 31->110 112 ntp.time.nl 94.198.159.10, 123, 63688 SIDNNL Netherlands 31->112 114 7 other IPs or domains 31->114 86 C:\Users\user\AppData\Local\...\BQ)).exe, PE32 31->86 dropped 88 C:\Users\user\AppData\...\06A_Q-q3C3.exe, PE32+ 31->88 dropped 116 Early bird code injection technique detected 31->116 118 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 31->118 120 Tries to steal Mail credentials (via file / registry access) 31->120 122 7 other signatures 31->122 36 06A_Q-q3C3.exe 8 2 31->36         started        40 BQ)).exe 31->40         started        42 chrome.exe 1 31->42         started        44 2 other processes 31->44 file11 signatures12 process13 file14 90 C:\ProgramData\Microsoft\...\WmiPrvSE.exe, PE32+ 36->90 dropped 132 Query firmware table information (likely to detect VMs) 36->132 134 Modifies windows update settings 36->134 136 Adds a directory exclusion to Windows Defender 36->136 138 Disable Windows Defender notifications (registry) 36->138 46 powershell.exe 36->46         started        49 powershell.exe 36->49         started        51 cmd.exe 1 36->51         started        64 11 other processes 36->64 92 C:\ProgramData\...\UserOOBEBroker.exe, PE32 40->92 dropped 140 Detected unpacking (changes PE section rights) 40->140 142 Creates an undocumented autostart registry key 40->142 144 Tries to detect sandboxes / dynamic malware analysis system (registry check) 40->144 53 cmd.exe 40->53         started        55 cmd.exe 40->55         started        146 Suspicious execution chain found 42->146 57 chrome.exe 42->57         started        60 chrome.exe 42->60         started        148 Writes to foreign memory regions 44->148 150 Allocates memory in foreign processes 44->150 62 dllhost.exe 44->62         started        signatures15 process16 dnsIp17 162 Loading BitLocker PowerShell Module 46->162 66 conhost.exe 46->66         started        68 conhost.exe 49->68         started        70 net.exe 1 51->70         started        72 conhost.exe 51->72         started        164 Uses schtasks.exe or at.exe to add and modify task schedules 53->164 78 2 other processes 53->78 80 2 other processes 55->80 102 142.250.81.225, 443, 49733 GOOGLEUS United States 57->102 104 127.0.0.1 unknown unknown 57->104 108 2 other IPs or domains 57->108 106 213.209.150.143, 4233, 49737 KEMINETAL Germany 62->106 74 conhost.exe 64->74         started        76 conhost.exe 64->76         started        82 8 other processes 64->82 signatures18 process19 process20 84 net1.exe 1 70->84         started       
Threat name:
Win32.Trojan.Amadey
Status:
Suspicious
First seen:
2025-06-12 04:31:51 UTC
File Type:
PE (Exe)
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Deletes itself
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
1b2a43bd39da50d2811c672a6a46aea4a48693535954534d88a05d278c62edd6
MD5 hash:
af2dfb4c4a2ff0d0ff1a391d68dac5c7
SHA1 hash:
c0b993d4f67f2bc193173d3863c9423ed5b2a871
Malware family:
Rhadamanthys
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Rhadamanthys

Executable exe 1b2a43bd39da50d2811c672a6a46aea4a48693535954534d88a05d278c62edd6

(this sample)

  
Delivery method
Distributed via web download

Comments