MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5cb6c17c36f745d704afc3379ce1d45fb30d793d9092229f43fc4294fbd1cd26. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 5cb6c17c36f745d704afc3379ce1d45fb30d793d9092229f43fc4294fbd1cd26
SHA3-384 hash: 8c654275f659f83aa8698f1d3c472da930b3f40110f5d67ad2d927a87fee95b2d54d3802550c7d94cded2c18923d8da6
SHA1 hash: a1f00cfedd8bed54f6d02681667da6cb3471a8a8
MD5 hash: 67521d6d6fde7feb69720ece14b64299
humanhash: alpha-oven-finch-oscar
File name:update.txt2.ps1
Download: download sample
Signature Rhadamanthys
File size:117'054 bytes
First seen:2025-03-31 13:06:48 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 3072:4AFvnMqt33x1woCV2IoxCJjyAs4B5Qlxt:RhnMM33x1J4yx4Bob
Threatray 1 similar samples on MalwareBazaar
TLSH T164B313410BF24C2A496E483831E62EA67B3F44A90C95B4D04FD7ED051A86B9C87DF77B
Magika txt
Reporter zhuzhu0009
Tags:ps1 Rhadamanthys

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
JP JP
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
agent shell spawn
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade obfuscated
Result
Threat name:
RHADAMANTHYS
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Yara detected AntiVM3
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1652893 Sample: update.txt2.ps1 Startdate: 31/03/2025 Architecture: WINDOWS Score: 100 65 Suricata IDS alerts for network traffic 2->65 67 Found malware configuration 2->67 69 Multi AV Scanner detection for dropped file 2->69 71 4 other signatures 2->71 11 msiexec.exe 78 38 2->11         started        14 powershell.exe 15 29 2->14         started        18 svchost.exe 1 1 2->18         started        process3 dnsIp4 51 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 11->51 dropped 53 C:\Users\user\AppData\Local\...\WiseTurbo.exe, PE32 11->53 dropped 20 WiseTurbo.exe 5 11->20         started        59 77.239.124.48, 49712, 80 DATAHOPDatahop-SixDegreesGB United Kingdom 14->59 87 Loading BitLocker PowerShell Module 14->87 24 conhost.exe 14->24         started        26 msiexec.exe 3 14->26         started        61 127.0.0.1 unknown unknown 18->61 file5 signatures6 process7 file8 47 C:\Users\user\AppData\Roaming\...\sqlite3.dll, PE32 20->47 dropped 49 C:\Users\user\AppData\...\WiseTurbo.exe, PE32 20->49 dropped 73 Switches to a custom stack to bypass stack traces 20->73 75 Found direct / indirect Syscall (likely to bypass EDR) 20->75 28 WiseTurbo.exe 3 20->28         started        signatures9 process10 file11 55 C:\Users\user\AppData\Local\...\mnbcfmleqvg, PE32 28->55 dropped 79 Found hidden mapped module (file has been removed from disk) 28->79 81 Maps a DLL or memory area into another process 28->81 83 Switches to a custom stack to bypass stack traces 28->83 85 Found direct / indirect Syscall (likely to bypass EDR) 28->85 32 cmd.exe 1 28->32         started        35 cmd.exe 1 28->35         started        signatures12 process13 signatures14 63 Switches to a custom stack to bypass stack traces 32->63 37 fontdrvhost.exe 32->37         started        41 conhost.exe 35->41         started        process15 dnsIp16 57 95.217.65.68, 2917, 49727 HETZNER-ASDE Germany 37->57 77 Switches to a custom stack to bypass stack traces 37->77 43 fontdrvhost.exe 37->43         started        signatures17 process18 process19 45 WerFault.exe 16 43->45         started       
Threat name:
Script.Trojan.Heuristic
Status:
Malicious
First seen:
2025-03-31 11:57:04 UTC
File Type:
Text
AV detection:
3 of 24 (12.50%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
rhadamanthys
Similar samples:
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery execution persistence privilege_escalation
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Command and Scripting Interpreter: PowerShell
Event Triggered Execution: Installer Packages
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Enumerates connected drives
Executes dropped EXE
Loads dropped DLL
Blocklisted process makes network request
Suspicious use of NtCreateUserProcessOtherParentProcess
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments