MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7d36d865c07e911c5eff4d45c8f7e837b0ffe589cefcd7a8d812477f4e05b5d7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 12


Intelligence 12 IOCs YARA 6 File information Comments 1

SHA256 hash: 7d36d865c07e911c5eff4d45c8f7e837b0ffe589cefcd7a8d812477f4e05b5d7
SHA3-384 hash: 397c120a862360d2c26d9cea3fbf95a6e8364e658ccb667ae6c22afd3d5a6dfa0a47cbb7ffd27f5f72c2bc9f1e259cb7
SHA1 hash: 6875d45d558a9cc12ac7e4753487df73908fe6a1
MD5 hash: bc2bec9810f53c3b1ca1220d05b0fea7
humanhash: sierra-floor-jupiter-tennessee
File name:bc2bec9810f53c3b1ca1220d05b0fea7
Download: download sample
Signature Rhadamanthys
File size:1'737'144 bytes
First seen:2023-03-11 20:10:22 UTC
Last seen:2023-03-12 08:10:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 533c5409968cfac36437ac5835c4d83f (7 x Rhadamanthys, 1 x Adware.Generic)
ssdeep 24576:ur99vy7F8EXAeRBf9zY7lXYZJ3oaHWuCpisNAbHWTWDlmhz:uZ9vy7uUl07WNhHuikAb2TWJs
TLSH T11E85E021AB84E238D868577B04249D46B1B8FF28FD001B4FBD873D2D097459DA5F6AB3
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon f0d4b69686a6e4f0 (1 x Rhadamanthys)
Reporter zbetcheckin
Tags:32 exe Rhadamanthys signed

Code Signing Certificate

Organisation:*.deviantart.com
Issuer:Amazon RSA 2048 M02
Algorithm:sha256WithRSAEncryption
Valid from:2023-02-20T00:00:00Z
Valid to:2023-11-24T23:59:59Z
Serial number: 0c7d77e829c56a8aa5ddaa98ef2d111f
Intelligence: 5 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 4762ef0f4917d1be9ba3274d8493bc9eed935c9753cc472601478b9f71a02ca4
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
4
# of downloads :
279
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bc2bec9810f53c3b1ca1220d05b0fea7
Verdict:
Malicious activity
Analysis date:
2023-03-11 20:10:50 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Creating a file
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
MeasuringTime
SystemUptime
CheckCmdLine
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cerber greyware overlay packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RHADAMANTHYS, Xmrig
Detection:
malicious
Classification:
rans.troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Changes security center settings (notifications, updates, antivirus, firewall)
Checks if the current machine is a virtual machine (disk enumeration)
DLL side loading technique detected
Found many strings related to Crypto-Wallets (likely being stolen)
Found potential ransomware demand text
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Self deletion via cmd or bat file
Snort IDS alert for network traffic
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Writes or reads registry keys via WMI
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected RHADAMANTHYS Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 824668 Sample: SKixwk8SeH.exe Startdate: 11/03/2023 Architecture: WINDOWS Score: 100 176 Snort IDS alert for network traffic 2->176 178 Multi AV Scanner detection for submitted file 2->178 180 Yara detected RHADAMANTHYS Stealer 2->180 182 7 other signatures 2->182 11 SKixwk8SeH.exe 10 2->11         started        16 Mivabino caya rod quijok quehedob moq fecija.exe 9 2->16         started        18 svchost.exe 2->18         started        20 9 other processes 2->20 process3 dnsIp4 152 mnxrxyulbk05pdg.docywg7eumhcj4sgz 11->152 134 Mivabino caya rod ...edob moq fecija.exe, PE32 11->134 dropped 136 Mivabino caya rod ...exe:Zone.Identifier, ASCII 11->136 dropped 212 Self deletion via cmd or bat file 11->212 214 Uses schtasks.exe or at.exe to add and modify task schedules 11->214 22 Mivabino caya rod quijok quehedob moq fecija.exe 8 11->22         started        27 cmd.exe 1 11->27         started        29 schtasks.exe 1 11->29         started        154 mnxrxyulbk05pdg.docywg7eumhcj4sgz 16->154 138 C:\Users\user\AppData\Local\...\7063250.dll, PE32 16->138 dropped 216 Writes to foreign memory regions 16->216 218 Allocates memory in foreign processes 16->218 220 Injects a PE file into a foreign processes 16->220 31 WerFault.exe 16->31         started        33 ngentask.exe 16->33         started        35 ngentask.exe 16->35         started        222 Changes security center settings (notifications, updates, antivirus, firewall) 18->222 37 MpCmdRun.exe 18->37         started        224 Query firmware table information (likely to detect VMs) 20->224 39 WerFault.exe 20->39         started        41 WerFault.exe 20->41         started        file5 signatures6 process7 dnsIp8 148 mnxrxyulbk05pdg.docywg7eumhcj4sgz 22->148 114 C:\Users\user\AppData\Local\...\7057578.dll, PE32 22->114 dropped 184 Writes to foreign memory regions 22->184 186 Allocates memory in foreign processes 22->186 188 Injects a PE file into a foreign processes 22->188 43 ngentask.exe 18 22->43         started        47 fontview.exe 22->47         started        50 WerFault.exe 22->50         started        190 Uses ping.exe to check the status of other devices and networks 27->190 52 PING.EXE 1 27->52         started        54 conhost.exe 27->54         started        56 chcp.com 1 27->56         started        58 conhost.exe 29->58         started        150 192.168.2.1 unknown unknown 31->150 60 conhost.exe 37->60         started        192 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 39->192 file9 signatures10 process11 dnsIp12 156 185.246.220.89, 49701, 49702, 49703 LVLT-10753US Germany 43->156 140 C:\Users\user\AppData\Local\Temp\stil2.exe, PE32 43->140 dropped 142 C:\Users\user\AppData\Roaming\...\bohx.exe, PE32 43->142 dropped 62 stil2.exe 43->62         started        67 stil2.exe 43->67         started        69 cmd.exe 43->69         started        73 2 other processes 43->73 226 Query firmware table information (likely to detect VMs) 47->226 228 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 47->228 230 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 47->230 232 3 other signatures 47->232 71 dllhost.exe 47->71         started        158 127.0.0.1 unknown unknown 52->158 file13 signatures14 process15 dnsIp16 160 shxkgp9m0jpqqwjrpfyiule.p79jslb9xwk3q 62->160 144 C:\Users\user\AppData\Local\...\7077968.dll, PE32 62->144 dropped 164 Machine Learning detection for dropped file 62->164 166 Writes to foreign memory regions 62->166 168 Allocates memory in foreign processes 62->168 75 ngentask.exe 62->75         started        79 fontview.exe 62->79         started        162 shxkgp9m0jpqqwjrpfyiule.p79jslb9xwk3q 67->162 146 C:\Users\user\AppData\Local\...\7082343.dll, PE32 67->146 dropped 170 Injects a PE file into a foreign processes 67->170 93 2 other processes 67->93 81 bohx.exe 69->81         started        83 conhost.exe 69->83         started        172 Tries to harvest and steal browser information (history, passwords, etc) 71->172 174 Maps a DLL or memory area into another process 71->174 85 systeminfo.exe 73->85         started        87 conhost.exe 73->87         started        89 conhost.exe 73->89         started        91 findstr.exe 73->91         started        file17 signatures18 process19 file20 124 C:\Users\user\AppData\Local\...\Cookies.bak, SQLite 75->124 dropped 194 Tries to harvest and steal browser information (history, passwords, etc) 75->194 196 DLL side loading technique detected 75->196 95 cmd.exe 75->95         started        97 cmd.exe 75->97         started        99 cmd.exe 75->99         started        198 Query firmware table information (likely to detect VMs) 79->198 200 Writes to foreign memory regions 79->200 202 Allocates memory in foreign processes 79->202 210 3 other signatures 79->210 126 C:\Users\user\AppData\...\PsInfo64.exe, PE32+ 81->126 dropped 128 C:\Users\user\AppData\Roaming\...\PsInfo.exe, PE32 81->128 dropped 130 C:\Users\user\AppData\Roaming\...\7zxa.dll, PE32 81->130 dropped 132 4 other files (2 malicious) 81->132 dropped 204 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 85->204 206 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 85->206 208 Writes or reads registry keys via WMI 85->208 101 fontview.exe 87->101         started        signatures21 process22 process23 103 bohx.exe 95->103         started        106 conhost.exe 95->106         started        108 conhost.exe 97->108         started        110 PsInfo.exe 97->110         started        112 conhost.exe 99->112         started        file24 116 C:\Users\user\AppData\...\softokn3.dll, PE32 103->116 dropped 118 C:\Users\user\AppData\Roaming\...\nss3.dll, PE32 103->118 dropped 120 C:\Users\user\AppData\Roaming\...\mozglue.dll, PE32 103->120 dropped 122 4 other files (1 malicious) 103->122 dropped
Threat name:
Win32.Trojan.Privateloader
Status:
Suspicious
First seen:
2023-03-11 19:53:41 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Gathers system information
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Deletes itself
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
2cb0b80ccd0706b1174c4a69fc65ddba4904cf04fb38d93b3b98fecc14db63e7
MD5 hash:
eb237fec0c77089533e79e9f8015bc69
SHA1 hash:
a454bdb371cd1a563ea28e97034d39b8a4b98c9b
SH256 hash:
7d36d865c07e911c5eff4d45c8f7e837b0ffe589cefcd7a8d812477f4e05b5d7
MD5 hash:
bc2bec9810f53c3b1ca1220d05b0fea7
SHA1 hash:
6875d45d558a9cc12ac7e4753487df73908fe6a1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Rhadamanthys

Executable exe 7d36d865c07e911c5eff4d45c8f7e837b0ffe589cefcd7a8d812477f4e05b5d7

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-03-11 20:10:26 UTC

url : hxxp://179.43.175.11/ape2.exe