MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 511f54d8a2373fc10c30e362a31cad57c95347e96ceca59b886def3ea01b87b4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 511f54d8a2373fc10c30e362a31cad57c95347e96ceca59b886def3ea01b87b4
SHA3-384 hash: 21482e684283936b72543bec765b60bf305ad57bfa8c3c9755174970720b2fcd1bdd3fd4cb2f60defdf236637a2da78c
SHA1 hash: 7a3a59156119a86088641b4e0fd756259258438e
MD5 hash: ae3e1d97349af966692a2d671152652d
humanhash: oven-wisconsin-mike-romeo
File name:launcher.exe
Download: download sample
Signature Rhadamanthys
File size:1'616'684 bytes
First seen:2025-08-13 15:12:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32f3282581436269b3a75b6675fe3e08 (197 x LummaStealer, 122 x Rhadamanthys, 8 x CoinMiner)
ssdeep 49152:TNc2xGefnU0xU3GDNP5VenUKRq3EgBOqULqj:pc2bfnxDNPyUQqzBOqyW
Threatray 1'538 similar samples on MalwareBazaar
TLSH T19F7533DA16CD5870DC9D38B83E7AF78226B3EF420C71BB2A9B1D9B8978244455D70327
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 3030301828283028 (1 x Rhadamanthys)
Reporter aachum
Tags:45-141-233-250 94-26-90-16 AutoIT CypherIT exe nexus-cloud-360-com Rhadamanthys youhack-guru


Avatar
iamaachum
https://youhack.guru/ => https://www.mediafire.com/folder/oo334e39dqvjr/launcher

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
launcher.exe
Verdict:
Malicious activity
Analysis date:
2025-08-13 15:06:11 UTC
Tags:
lumma stealer auto-sch auto-startup autoit rhadamanthys shellcode

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autoit emotet cobalt nsis
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a file
Searching for the window
Searching for the Windows task manager window
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Creating a process from a recently created file
Сreating synchronization primitives
DNS request
Possible injection to a system process
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context anti-debug blackhole installer microsoft_visual_cc overlay overlay
Result
Threat name:
Coinhive, RHADAMANTHYS, Xmrig
Detection:
malicious
Classification:
troj.spyw.expl.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Detected CypherIt Packer
Detected Stratum mining protocol
Disable Windows Defender notifications (registry)
Downloads suspicious files via Chrome
Drops PE files with a suspicious file extension
Early bird code injection technique detected
Found malware configuration
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Sigma detected: Drops script at startup location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Search for Antivirus process
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Yara detected Coinhive miner
Yara detected RHADAMANTHYS Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1756142 Sample: launcher.exe Startdate: 13/08/2025 Architecture: WINDOWS Score: 100 149 wXFJuvVRFDcmPxgIcux.wXFJuvVRFDcmPxgIcux 2->149 151 x.ns.gin.ntt.net 2->151 153 11 other IPs or domains 2->153 197 Found malware configuration 2->197 199 Antivirus detection for dropped file 2->199 201 Multi AV Scanner detection for submitted file 2->201 203 14 other signatures 2->203 15 msedge.exe 2->15         started        19 launcher.exe 29 2->19         started        21 wscript.exe 2->21         started        24 7 other processes 2->24 signatures3 process4 dnsIp5 177 192.168.2.5, 1888, 443, 49675 unknown unknown 15->177 179 239.255.255.250 unknown Reserved 15->179 123 C:\Users\user\...\typosquatting_list.pb, PDP-11 15->123 dropped 125 C:\Users\user\AppData\...\widevinecdm.dll, PE32+ 15->125 dropped 127 C:\Users\user\AppData\...\webui-setup.js, ASCII 15->127 dropped 131 39 other malicious files 15->131 dropped 26 msedge.exe 15->26         started        29 msedge.exe 15->29         started        31 msedge.exe 15->31         started        33 msedge.exe 15->33         started        129 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 19->129 dropped 35 cmd.exe 1 19->35         started        211 Windows Scripting host queries suspicious COM object (likely to drop second stage) 21->211 38 ElijahSphere.com 21->38         started        40 WerFault.exe 24->40         started        42 conhost.exe 24->42         started        file6 signatures7 process8 dnsIp9 167 s-part-0012.t-0009.t-msedge.net 13.107.246.40, 443, 49709, 49716 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 26->167 169 ln-0007.ln-msedge.net 150.171.22.17, 443, 49708 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 26->169 171 11 other IPs or domains 26->171 205 Detected CypherIt Packer 35->205 207 Drops PE files with a suspicious file extension 35->207 209 Uses schtasks.exe or at.exe to add and modify task schedules 35->209 44 cmd.exe 4 35->44         started        47 conhost.exe 35->47         started        signatures10 process11 file12 145 C:\Users\user\AppData\Local\...\Fabulous.pif, PE32 44->145 dropped 49 Fabulous.pif 4 44->49         started        53 extrac32.exe 14 44->53         started        55 tasklist.exe 1 44->55         started        57 2 other processes 44->57 process13 file14 133 C:\Users\user\AppData\...lijahSphere.com, PE32 49->133 dropped 135 C:\Users\user\AppData\Local\..., OpenPGP 49->135 dropped 181 Drops PE files with a suspicious file extension 49->181 183 Switches to a custom stack to bypass stack traces 49->183 59 OpenWith.exe 49->59         started        63 cmd.exe 2 49->63         started        66 cmd.exe 1 49->66         started        68 WerFault.exe 49->68         started        signatures15 process16 dnsIp17 173 cloudflare-dns.com 104.16.248.249, 443, 49692, 49726 CLOUDFLARENETUS United States 59->173 175 nexus-cloud-360.com 45.141.233.250, 1888, 49693 ASDETUKhttpwwwheficedcomGB Bulgaria 59->175 223 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 59->223 225 Switches to a custom stack to bypass stack traces 59->225 70 dllhost.exe 59->70         started        147 C:\Users\user\AppData\...lijahSphere.url, MS 63->147 dropped 75 conhost.exe 63->75         started        77 conhost.exe 66->77         started        79 schtasks.exe 1 66->79         started        file18 signatures19 process20 dnsIp21 161 nexus-cloud-360.com 70->161 163 ntp.time.nl 94.198.159.10 SIDNNL Netherlands 70->163 165 8 other IPs or domains 70->165 141 C:\Users\user\AppData\Local\...\FN2)445[.exe, PE32 70->141 dropped 143 C:\Users\user\AppData\Local\...\3{KhiZc.exe, PE32+ 70->143 dropped 213 System process connects to network (likely due to code injection or exploit) 70->213 215 Early bird code injection technique detected 70->215 217 Tries to harvest and steal browser information (history, passwords, etc) 70->217 219 2 other signatures 70->219 81 3{KhiZc.exe 70->81         started        85 wmplayer.exe 70->85         started        87 FN2)445[.exe 70->87         started        89 3 other processes 70->89 file22 signatures23 process24 file25 137 C:\ProgramData\Microsoft\...\WmiPrvSE.exe, PE32+ 81->137 dropped 185 Antivirus detection for dropped file 81->185 187 Query firmware table information (likely to detect VMs) 81->187 189 Modifies windows update settings 81->189 195 3 other signatures 81->195 91 powershell.exe 81->91         started        94 cmd.exe 81->94         started        191 Writes to foreign memory regions 85->191 193 Allocates memory in foreign processes 85->193 139 C:\Users\user\AppData\...\UserOOBEBroker.exe, PE32 87->139 dropped 96 cmd.exe 87->96         started        98 cmd.exe 87->98         started        100 chrome.exe 89->100         started        103 chrome.exe 89->103         started        105 msedge.exe 89->105         started        signatures26 process27 dnsIp28 221 Loading BitLocker PowerShell Module 91->221 107 conhost.exe 91->107         started        109 net.exe 94->109         started        111 conhost.exe 94->111         started        113 conhost.exe 96->113         started        115 schtasks.exe 96->115         started        117 conhost.exe 98->117         started        119 timeout.exe 98->119         started        155 googlehosted.l.googleusercontent.com 142.250.65.225, 443, 49704 GOOGLEUS United States 100->155 157 127.0.0.1 unknown unknown 100->157 159 2 other IPs or domains 100->159 signatures29 process30 process31 121 net1.exe 109->121         started       
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PE (Portable Executable)
Threat name:
Win32.Trojan.LummaStealer
Status:
Malicious
First seen:
2025-08-13 08:50:00 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Result
Malware family:
rhadamanthys
Score:
  10/10
Tags:
family:rhadamanthys discovery execution persistence stealer
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Windows directory
Enumerates processes with tasklist
Drops startup file
Executes dropped EXE
Loads dropped DLL
Detects Rhadamanthys Payload
Rhadamanthys
Rhadamanthys family
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
511f54d8a2373fc10c30e362a31cad57c95347e96ceca59b886def3ea01b87b4
MD5 hash:
ae3e1d97349af966692a2d671152652d
SHA1 hash:
7a3a59156119a86088641b4e0fd756259258438e
SH256 hash:
bb4fb924885b8d6719cb88e7f231abcbb7c2a1c69be92a12ce7bb56bed9129e3
MD5 hash:
094ae615109634f48bede4a612e36fc8
SHA1 hash:
a8b8cbf4d8a7f368b3ae53090bab40a2793657eb
SH256 hash:
8165c7aef7de3d3e0549776535bedc380ad9be7bb85e60ad6436f71528d092af
MD5 hash:
08e9796ca20c5fc5076e3ac05fb5709a
SHA1 hash:
07971d52dcbaa1054060073571ced046347177f7
Malware family:
Rhadamanthys
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Rhadamanthys

Executable exe 511f54d8a2373fc10c30e362a31cad57c95347e96ceca59b886def3ea01b87b4

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
SHELL32.dll::SHFileOperationW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenProcess
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetDiskFreeSpaceW
KERNEL32.dll::GetCommandLineW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::GetWindowsDirectoryW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuW
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::OpenClipboard
USER32.dll::PeekMessageW
USER32.dll::CreateWindowExW

Comments