MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 406a73f5ad1ead2ce933ed7197803219e0b888d7203a2455d1ac0267f61649d7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 14


Intelligence 14 IOCs YARA 18 File information Comments

SHA256 hash: 406a73f5ad1ead2ce933ed7197803219e0b888d7203a2455d1ac0267f61649d7
SHA3-384 hash: 85f65ce1322071e52b902f7b197ddfb366fc85062e91450eb4c6de3bc1ddc472a951efa65f6a6eff2a4ed30ff3e78677
SHA1 hash: 3f09aff37a0a0a061ff0cf2c99fbc6d9c7df590d
MD5 hash: e6d7fa3934bed3b1bfd8fce64d66df49
humanhash: north-lion-juliet-iowa
File name:LicDist_4.6.1.exe
Download: download sample
Signature Rhadamanthys
File size:6'740'920 bytes
First seen:2025-10-07 18:57:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 85f3b0bdda526ca9cafaa444a042adb9 (1 x Rhadamanthys)
ssdeep 98304:QoCNr2j8SC1U33DUZu0sIl+wNrYk+Y7KVvUaAdbmNB9hWG1qa:QU8HSAwlcP6iKyaNB9h5ka
TLSH T19566AE13F28250EDC49EC170825B56217A35BC544B36AAEF1280BB746F75BD02F3EB69
TrID 36.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
23.5% (.EXE) Win64 Executable (generic) (10522/11/4)
11.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.0% (.EXE) Win32 Executable (generic) (4504/4/1)
4.6% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter burger
Tags:exe Rhadamanthys

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
LicDist_4.6.1.exe
Verdict:
Malicious activity
Analysis date:
2025-10-07 18:55:00 UTC
Tags:
anti-evasion lumma stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
70%
Tags:
injection obfusc spawn
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Adding an access-denied ACE
Creating a window
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Connection attempt
DNS request
Sending a UDP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug crypto expand installer invalid-signature lolbin nsis overlay packed signed
Result
Threat name:
RHADAMANTHYS
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious PE digital signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Early bird code injection technique detected
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Queues an APC in another process (thread injection)
Tries to detect sandboxes / dynamic malware analysis system (Installed program check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1790928 Sample: LicDist_4.6.1.exe Startdate: 07/10/2025 Architecture: WINDOWS Score: 100 45 twc.trafficmanager.net 2->45 47 time.windows.com 2->47 49 5 other IPs or domains 2->49 79 Found malware configuration 2->79 81 Malicious sample detected (through community Yara rule) 2->81 83 Yara detected RHADAMANTHYS Stealer 2->83 85 2 other signatures 2->85 8 LicDist_4.6.1.exe 6 2->8         started        12 msedge.exe 104 370 2->12         started        14 elevation_service.exe 2->14         started        16 3 other processes 2->16 signatures3 process4 dnsIp5 59 84.21.189.163, 48484, 49693, 49735 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 8->59 61 time-a-g.nist.gov 129.6.15.28, 123, 62134 US-NATIONAL-INSTITUTE-OF-STANDARDS-AND-TECHNOLOGYUS United States 8->61 65 6 other IPs or domains 8->65 87 Early bird code injection technique detected 8->87 89 Found many strings related to Crypto-Wallets (likely being stolen) 8->89 91 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->91 93 7 other signatures 8->93 18 wmprph.exe 8->18         started        21 chrome.exe 8->21         started        23 msedge.exe 14 8->23         started        25 chrome.exe 8->25         started        63 239.255.255.250 unknown Reserved 12->63 27 msedge.exe 12->27         started        30 msedge.exe 12->30         started        32 msedge.exe 12->32         started        34 2 other processes 12->34 signatures6 process7 dnsIp8 73 Writes to foreign memory regions 18->73 75 Allocates memory in foreign processes 18->75 36 dllhost.exe 18->36         started        77 Found many strings related to Crypto-Wallets (likely being stolen) 21->77 39 chrome.exe 21->39         started        41 chrome.exe 21->41         started        43 msedge.exe 23->43         started        67 part-0013.t-0009.t-msedge.net 13.107.213.41, 443, 49720, 49721 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 27->67 69 part-0013.t-0009.fb-t-msedge.net 13.107.226.41, 443, 49714, 49715 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 27->69 71 13 other IPs or domains 27->71 signatures9 process10 dnsIp11 51 84.21.189.175, 45433, 49739 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 36->51 53 googlehosted.l.googleusercontent.com 142.250.217.225, 443, 49706 GOOGLEUS United States 39->53 55 127.0.0.1 unknown unknown 39->55 57 clients2.googleusercontent.com 39->57
Gathering data
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2025-10-07 18:56:55 UTC
File Type:
PE+ (Exe)
Extracted files:
5
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
shellterloader rhadamanthys
Similar samples:
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of NtSetInformationThreadHideFromDebugger
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
406a73f5ad1ead2ce933ed7197803219e0b888d7203a2455d1ac0267f61649d7
MD5 hash:
e6d7fa3934bed3b1bfd8fce64d66df49
SHA1 hash:
3f09aff37a0a0a061ff0cf2c99fbc6d9c7df590d
SH256 hash:
3e9aa71316d5815502c1ca9352c9fd5823443b50bc43044c78fbf27468eeffcc
MD5 hash:
0de2befccbf4f1cf6ee5e3a918f688a9
SHA1 hash:
c7bbd490df6b2b5170e7c00f733970aaf2df10c2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:Check_OutputDebugStringA_iat
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments