MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5463c50813c1c23b8c7317521fa0d838639932a0f13bf5ae89e009f3713eeb3b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 5463c50813c1c23b8c7317521fa0d838639932a0f13bf5ae89e009f3713eeb3b
SHA3-384 hash: 4d98d871917890505e170eb784aa5bba6444a97361ae574f2a70402a44f6eccc909c42e13996c2e166ef07437dd3413c
SHA1 hash: 692f3749ee86c3d8e86fa01ef825c5481ef787f6
MD5 hash: f6aef42f378de27b578513c4abc2be14
humanhash: speaker-uncle-wolfram-aspen
File name:1.ps1
Download: download sample
Signature Rhadamanthys
File size:16'738 bytes
First seen:2025-09-28 13:12:54 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 384:JXNGJbj01cLgoGjYehcgkGEqCvMOlBvit6IamnhA5j/:3GJbj0aw/EqOB5L5j/
Threatray 471 similar samples on MalwareBazaar
TLSH T18F72E1127334456A0E4FC6FBE83275DFF1AB8932853208D1B492BA6027CAFD02076E85
Magika powershell
Reporter aachum
Tags:185-141-216-74 202-71-14-181 ClickFix FakeCaptcha ps1 Rhadamanthys


Avatar
iamaachum
https://google-security-bypass.pages.dev/ => http://185.141.216.74/1.txt

Intelligence


File Origin
# of uploads :
1
# of downloads :
289
Origin country :
ES ES
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
trojan agent shell
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
explorer golang lolbin obfuscated
Verdict:
Malicious
File Type:
ps1
First seen:
2025-09-28T10:21:00Z UTC
Last seen:
2025-09-28T10:21:00Z UTC
Hits:
~10
Detections:
Trojan-Downloader.PowerShell.Agent.sb Trojan-Downloader.Agent.HTTP.C&C Trojan.Win64.SBEscape.sb Trojan.Win32.Crypt.sb PDM:Trojan.Win32.Generic Trojan.Win64.SBEscape.app NetTool.PowerShellUA.HTTP.C&C NetTool.PowerShellGet.HTTP.C&C
Result
Threat name:
RHADAMANTHYS
Detection:
malicious
Classification:
troj.evad.mine
Score:
80 / 100
Signature
AI detected malicious Powershell script
Antivirus detection for URL or domain
Contains functionality to registers a callback to get notified when the system is suspended or resumed (often done by Miners)
Drops PE files to the user root directory
Loading BitLocker PowerShell Module
Potentially malicious time measurement code found
Powershell drops PE file
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1785498 Sample: 1.ps1 Startdate: 28/09/2025 Architecture: WINDOWS Score: 80 33 Antivirus detection for URL or domain 2->33 35 Yara detected RHADAMANTHYS Stealer 2->35 37 AI detected malicious Powershell script 2->37 8 powershell.exe 15 28 2->8         started        13 explorer.exe 2->13         started        process3 dnsIp4 31 185.141.216.74, 49690, 80 GSWIFTTR Turkey 8->31 27 C:\Users\user\Octavian.exe, PE32+ 8->27 dropped 43 Drops PE files to the user root directory 8->43 45 Loading BitLocker PowerShell Module 8->45 47 Powershell drops PE file 8->47 15 explorer.exe 1 8->15         started        17 conhost.exe 8->17         started        19 Octavian.exe 13->19         started        file5 signatures6 process7 signatures8 39 Contains functionality to registers a callback to get notified when the system is suspended or resumed (often done by Miners) 19->39 41 Potentially malicious time measurement code found 19->41 22 OpenWith.exe 19->22         started        process9 dnsIp10 29 202.71.14.181, 443, 49692 RKINFRATEL-INRKINFRATELLIMITEDIN India 22->29 25 WerFault.exe 4 22->25         started        process11
Verdict:
Malware
YARA:
1 match(es)
Tags:
Base64 Block Contains Base64 Block DeObfuscated PowerShell
Threat name:
Script-PowerShell.Trojan.Rhadamanthys
Status:
Suspicious
First seen:
2025-09-28 13:13:27 UTC
File Type:
Text
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Executes dropped EXE
Badlisted process makes network request
Downloads MZ/PE file
Suspicious use of NtCreateUserProcessOtherParentProcess
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Rhadamanthys

PowerShell (PS) ps1 5463c50813c1c23b8c7317521fa0d838639932a0f13bf5ae89e009f3713eeb3b

(this sample)

Comments