MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 51e643e61222e1c62f93978a78dcf1204883011e3cadbec9ce5fa4e49fb21e27. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: 51e643e61222e1c62f93978a78dcf1204883011e3cadbec9ce5fa4e49fb21e27
SHA3-384 hash: 8dbf60d0458c399db8d7ba7daf9efb8bc9b81b8a346003fcf047cec6be0d0826001db19781233cdc7750a45cf907f3c4
SHA1 hash: 84ad82b06a93f506e543ade9f33c297e24c8afdb
MD5 hash: 53587919f0c06accee5015c4e2b7b3ab
humanhash: angel-steak-delta-sierra
File name:SecuriteInfo.com.Win32.Evo-gen.25754.25684
Download: download sample
Signature Rhadamanthys
File size:5'057'536 bytes
First seen:2025-06-11 21:28:22 UTC
Last seen:2025-06-11 22:28:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7d746b91e1e57b358f148ed3374f0079 (41 x Rhadamanthys)
ssdeep 98304:/BzIgdqjfVH/Q9OpBfKiK8q1S23bpdBX9slWc76ESSwV:tIgifZ/oOPfPFp0nxaUEy
TLSH T1E936338A5AC71ADBD44E70B84647FEECB1F066E44630CDAB60686FDFEC6B2409431167
TrID 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.6% (.EXE) Win32 Executable (generic) (4504/4/1)
8.5% (.ICL) Windows Icons Library (generic) (2059/9)
8.3% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter SecuriteInfoCom
Tags:exe Rhadamanthys

Intelligence


File Origin
# of uploads :
2
# of downloads :
438
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Win32.Evo-gen.25754.25684
Verdict:
Malicious activity
Analysis date:
2025-06-11 22:04:12 UTC
Tags:
stealer rhadamanthys shellcode pastebin winring0x64-sys vuln-driver

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
81.4%
Tags:
philis trojan hello
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Launching a process
Using the Windows Management Instrumentation requests
Unauthorized injection to a system process
Result
Threat name:
RHADAMANTHYS
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Connects to a pastebin service (likely for C&C)
Deletes itself after installation
Disable Windows Defender notifications (registry)
Early bird code injection technique detected
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Sigma detected: Files With System Process Name In Unsuspected Locations
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes / dynamic malware analysis system (Installed program check)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1712737 Sample: SecuriteInfo.com.Win32.Evo-... Startdate: 11/06/2025 Architecture: WINDOWS Score: 100 90 pastebin.com 2->90 92 time.google.com 2->92 94 6 other IPs or domains 2->94 118 Multi AV Scanner detection for submitted file 2->118 120 Yara detected RHADAMANTHYS Stealer 2->120 122 .NET source code contains potential unpacker 2->122 126 3 other signatures 2->126 12 SecuriteInfo.com.Win32.Evo-gen.25754.25684.exe 2->12         started        15 msedge.exe 104 362 2->15         started        18 elevation_service.exe 2->18         started        20 3 other processes 2->20 signatures3 124 Connects to a pastebin service (likely for C&C) 90->124 process4 dnsIp5 152 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 12->152 154 Switches to a custom stack to bypass stack traces 12->154 22 OpenWith.exe 12->22         started        26 conhost.exe 12->26         started        116 239.255.255.250 unknown Reserved 15->116 156 Maps a DLL or memory area into another process 15->156 28 msedge.exe 15->28         started        30 msedge.exe 15->30         started        32 msedge.exe 15->32         started        34 3 other processes 15->34 signatures6 process7 dnsIp8 102 180.178.189.34, 49692, 49724, 49725 GALAXY-AS-APGalaxyBroadbandPK Pakistan 22->102 136 Deletes itself after installation 22->136 138 Switches to a custom stack to bypass stack traces 22->138 36 OpenWith.exe 8 22->36         started        104 s-part-0012.t-0009.t-msedge.net 13.107.246.40, 443, 49707 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 28->104 106 13.107.246.51, 443, 49718, 49719 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 28->106 108 8 other IPs or domains 28->108 signatures9 process10 dnsIp11 96 ntp.time.nl 94.198.159.10, 123, 55459 SIDNNL Netherlands 36->96 98 time.google.com 216.239.35.0, 123, 55459 GOOGLEUS United States 36->98 100 5 other IPs or domains 36->100 84 C:\Users\user\AppData\Local\...\_GNr5eX.exe, PE32+ 36->84 dropped 86 C:\Users\user\AppData\Local\...\3I5LLk7a-.exe, PE32 36->86 dropped 128 Early bird code injection technique detected 36->128 130 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 36->130 132 Tries to steal Mail credentials (via file / registry access) 36->132 134 7 other signatures 36->134 41 _GNr5eX.exe 36->41         started        45 wmpnscfg.exe 36->45         started        47 chrome.exe 1 36->47         started        49 2 other processes 36->49 file12 signatures13 process14 file15 88 C:\ProgramData\Microsoft\...\WmiPrvSE.exe, PE32+ 41->88 dropped 140 Query firmware table information (likely to detect VMs) 41->140 142 Modifies windows update settings 41->142 144 Disable Windows Defender notifications (registry) 41->144 146 Tries to detect sandboxes / dynamic malware analysis system (registry check) 41->146 51 cmd.exe 41->51         started        53 sc.exe 41->53         started        55 sc.exe 41->55         started        64 7 other processes 41->64 148 Writes to foreign memory regions 45->148 150 Allocates memory in foreign processes 45->150 57 chrome.exe 47->57         started        60 chrome.exe 47->60         started        62 msedge.exe 49->62         started        signatures16 process17 dnsIp18 66 net.exe 51->66         started        68 conhost.exe 51->68         started        70 conhost.exe 53->70         started        72 conhost.exe 55->72         started        110 142.250.64.65, 443, 49702 GOOGLEUS United States 57->110 112 127.0.0.1 unknown unknown 57->112 114 2 other IPs or domains 57->114 74 conhost.exe 64->74         started        76 conhost.exe 64->76         started        78 conhost.exe 64->78         started        80 3 other processes 64->80 process19 process20 82 net1.exe 66->82         started       
Threat name:
Win32.Trojan.Rhadamanthys
Status:
Malicious
First seen:
2025-06-11 21:29:15 UTC
File Type:
PE (Exe)
AV detection:
30 of 38 (78.95%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
rhadamanthys
Similar samples:
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Deletes itself
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
51e643e61222e1c62f93978a78dcf1204883011e3cadbec9ce5fa4e49fb21e27
MD5 hash:
53587919f0c06accee5015c4e2b7b3ab
SHA1 hash:
84ad82b06a93f506e543ade9f33c297e24c8afdb
Malware family:
Rhadamanthys
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Rhadamanthys

Executable exe 51e643e61222e1c62f93978a78dcf1204883011e3cadbec9ce5fa4e49fb21e27

(this sample)

  
Delivery method
Distributed via web download

Comments