MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9926933a12076a75672d0f7053cdb83dca09ab42d9bb0d7b73d3562f7d62381d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 9926933a12076a75672d0f7053cdb83dca09ab42d9bb0d7b73d3562f7d62381d
SHA3-384 hash: cde459feca73e377c7855048c0032a8f2b7623ae328b8fbaa54a31a138d587dd04696a6dc016aebe20411cb545a938b6
SHA1 hash: 5a5091f2ed47a306dd68f8c332ff82efd18ed6a2
MD5 hash: 2ccc4345ec927a6117a3e07caa5809af
humanhash: burger-cup-emma-twenty
File name:2ccc4345ec927a6117a3e07caa5809af.bat
Download: download sample
Signature Rhadamanthys
File size:375 bytes
First seen:2024-12-04 13:19:44 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/x-msdos-batch
ssdeep 6:hSG81R3KuX85AwgJrsHmr5Syl75EuH1MFCv8STFx755yjSAwgJrsHmrryyl7KXYa:0G81kTQJrDr5SylFt1M40WFxF52JrDr6
TLSH T15DE0266312BA6307EA308078F5F21F43F20BB383C487BB961616BA9C559D04F7AE8502
Magika txt
Reporter abuse_ch
Tags:bat Rhadamanthys

Intelligence


File Origin
# of uploads :
1
# of downloads :
90
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2ccc4345ec927a6117a3e07caa5809af.bat
Verdict:
Malicious activity
Analysis date:
2024-12-04 13:23:51 UTC
Tags:
loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
gumen virus shell overt
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching a process
Сreating synchronization primitives
Connection attempt
Searching for the window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
dropper kiosk powershell
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
72 / 100
Signature
AI detected suspicious sample
Antivirus detection for URL or domain
Connects to many ports of the same IP (likely port scanning)
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Suspicious powershell command line found
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1568272 Sample: oLY6JbNl9i.bat Startdate: 04/12/2024 Architecture: WINDOWS Score: 72 50 Antivirus detection for URL or domain 2->50 52 Connects to many ports of the same IP (likely port scanning) 2->52 54 Uses known network protocols on non-standard ports 2->54 56 AI detected suspicious sample 2->56 8 cmd.exe 1 2->8         started        11 msedge.exe 64 364 2->11         started        14 svchost.exe 1 2 2->14         started        process3 dnsIp4 58 Suspicious powershell command line found 8->58 16 powershell.exe 14 29 8->16         started        20 conhost.exe 8->20         started        42 192.168.2.6, 18960, 443, 49706 unknown unknown 11->42 44 239.255.255.250 unknown Reserved 11->44 60 Maps a DLL or memory area into another process 11->60 22 msedge.exe 11->22         started        24 identity_helper.exe 11->24         started        26 msedge.exe 11->26         started        28 3 other processes 11->28 46 127.0.0.1 unknown unknown 14->46 signatures5 process6 dnsIp7 34 95.169.201.100, 18960, 49714, 49767 GOBULNETBG Bulgaria 16->34 48 Loading BitLocker PowerShell Module 16->48 30 msedge.exe 10 16->30         started        36 13.107.246.38, 443, 49893, 49894 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 22->36 38 s-part-0035.t-0009.t-msedge.net 13.107.246.63, 443, 49713, 49715 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 22->38 40 10 other IPs or domains 22->40 signatures8 process9 process10 32 msedge.exe 30->32         started       
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery execution
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Browser Information Discovery
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Rhadamanthys

Batch (bat) bat 9926933a12076a75672d0f7053cdb83dca09ab42d9bb0d7b73d3562f7d62381d

(this sample)

  
Delivery method
Distributed via web download

Comments