MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ad3ea6a4067d44f0183645de77363c1bf86b8ea5fd0be55f5611cc408aa4a0a8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 16


Intelligence 16 IOCs YARA 10 File information Comments

SHA256 hash: ad3ea6a4067d44f0183645de77363c1bf86b8ea5fd0be55f5611cc408aa4a0a8
SHA3-384 hash: 1b21bea0a42f807d2bad6a3714dfc5c41c10f7c335d95db5ae01d955d87e7b5b925f18d9de5baf7e06d96eb9bcd7f9d7
SHA1 hash: 3916ffcb7800317abeef908e71eba4b63e10fa8f
MD5 hash: dcca828d3600e33fb85e5623ec512b11
humanhash: hot-stairway-white-victor
File name:dcca828d3600e33fb85e5623ec512b11.exe
Download: download sample
Signature Rhadamanthys
File size:4'272'348 bytes
First seen:2025-07-26 09:39:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f557cb5e3abb3bc5ede97f2a0da19e34 (2 x DeerStealer, 1 x AsyncRAT, 1 x Arechclient2)
ssdeep 98304:Qi0vYJoeEq3UowOPrbzcFok3k/NtxJdvMgpu0ERCIaDc254:Qi0AJoeb3UolsFok3cNHkgpuXYc2K
TLSH T121162349F3A1DCF4FD2B813C94310411BF61BC1A57A5969F124CB6623E33292587FABA
TrID 92.4% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.6% (.EXE) Win64 Executable (generic) (10522/11/4)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
0.7% (.EXE) OS/2 Executable (generic) (2029/13)
0.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
dhash icon 74e4d4d4ecf4d4d4 (23 x GuLoader, 20 x LummaStealer, 19 x AgentTesla)
Reporter abuse_ch
Tags:exe Rhadamanthys

Intelligence


File Origin
# of uploads :
1
# of downloads :
37
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
dcca828d3600e33fb85e5623ec512b11.exe
Verdict:
Malicious activity
Analysis date:
2025-07-26 09:48:37 UTC
Tags:
stealer rhadamanthys shellcode

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect dropper virus smtp
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Creating a file in the %temp% directory
Sending a custom TCP request
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm evasive fingerprint infostealer lolbin microsoft_visual_cc obfuscated overlay packed packer_detected remote tracker
Malware family:
Sysinternals
Verdict:
Suspicious
Result
Threat name:
HijackLoader, RHADAMANTHYS
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Connects to many ports of the same IP (likely port scanning)
Drops PE files to the user root directory
Early bird code injection technique detected
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes / dynamic malware analysis system (Installed program check)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected HijackLoader
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1744560 Sample: LIKyOvhUMh.exe Startdate: 26/07/2025 Architecture: WINDOWS Score: 100 98 x.ns.gin.ntt.net 2->98 100 twc.trafficmanager.net 2->100 102 6 other IPs or domains 2->102 128 Multi AV Scanner detection for dropped file 2->128 130 Multi AV Scanner detection for submitted file 2->130 132 Yara detected HijackLoader 2->132 134 3 other signatures 2->134 13 LIKyOvhUMh.exe 12 2->13         started        17 FrameElectro.exe 5 2->17         started        19 elevation_service.exe 2->19         started        21 3 other processes 2->21 signatures3 process4 file5 76 C:\Users\user\smooth.dll, PE32 13->76 dropped 78 C:\Users\user\libstdc++.dll, PE32 13->78 dropped 80 C:\Users\user\libgcc.dll, PE32 13->80 dropped 84 3 other malicious files 13->84 dropped 150 Drops PE files to the user root directory 13->150 23 FrameElectro.exe 9 13->23         started        82 C:\Users\user\AppData\Local\...\3CE4EA9.tmp, PE32 17->82 dropped 152 Maps a DLL or memory area into another process 17->152 154 Found direct / indirect Syscall (likely to bypass EDR) 17->154 27 ByteSch86.exe 17->27         started        29 tcpvcon.exe 1 17->29         started        signatures6 process7 file8 68 C:\ProgramData\checkTool\smooth.dll, PE32 23->68 dropped 70 C:\ProgramData\checkTool\FrameElectro.exe, PE32 23->70 dropped 72 C:\ProgramData\checkTool\libstdc++.dll, PE32 23->72 dropped 74 3 other files (none is malicious) 23->74 dropped 144 Switches to a custom stack to bypass stack traces 23->144 31 FrameElectro.exe 7 23->31         started        146 Found direct / indirect Syscall (likely to bypass EDR) 27->146 35 conhost.exe 29->35         started        signatures9 process10 file11 86 C:\Users\user\AppData\Roaming\...\tcpvcon.exe, PE32 31->86 dropped 88 C:\Users\user\AppData\Local\...\2CAE427.tmp, PE32 31->88 dropped 90 C:\ProgramData\ByteSch86.exe, PE32 31->90 dropped 112 Found hidden mapped module (file has been removed from disk) 31->112 114 Maps a DLL or memory area into another process 31->114 116 Switches to a custom stack to bypass stack traces 31->116 118 Found direct / indirect Syscall (likely to bypass EDR) 31->118 37 ByteSch86.exe 31->37         started        40 tcpvcon.exe 1 31->40         started        signatures12 process13 signatures14 140 Switches to a custom stack to bypass stack traces 37->140 142 Found direct / indirect Syscall (likely to bypass EDR) 37->142 42 OpenWith.exe 37->42         started        46 conhost.exe 40->46         started        process15 dnsIp16 104 185.102.115.8, 44133, 49722, 49735 MaxihostLTDABR Poland 42->104 148 Switches to a custom stack to bypass stack traces 42->148 48 OpenWith.exe 3 42->48         started        signatures17 process18 dnsIp19 92 time-a-g.nist.gov 129.6.15.28, 123, 63764 US-NATIONAL-INSTITUTE-OF-STANDARDS-AND-TECHNOLOGYUS United States 48->92 94 ntp.time.nl 94.198.159.10, 123, 63764 SIDNNL Netherlands 48->94 96 6 other IPs or domains 48->96 120 Early bird code injection technique detected 48->120 122 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 48->122 124 Tries to steal Mail credentials (via file / registry access) 48->124 126 6 other signatures 48->126 52 wmplayer.exe 48->52         started        55 chrome.exe 48->55         started        57 chrome.exe 48->57         started        59 WerFault.exe 48->59         started        signatures20 process21 signatures22 136 Writes to foreign memory regions 52->136 138 Allocates memory in foreign processes 52->138 61 dllhost.exe 52->61         started        63 chrome.exe 55->63         started        66 chrome.exe 55->66         started        process23 dnsIp24 106 googlehosted.l.googleusercontent.com 142.251.40.225, 443, 49732, 49733 GOOGLEUS United States 63->106 108 127.0.0.1 unknown unknown 63->108 110 clients2.googleusercontent.com 63->110
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) Win 64 Exe x64
Threat name:
Win64.Trojan.HeavensGate
Status:
Malicious
First seen:
2025-07-22 07:10:00 UTC
File Type:
PE+ (Exe)
Extracted files:
51
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Verdict:
suspicious
Label(s):
rhadamanthys
Similar samples:
Result
Malware family:
rhadamanthys
Score:
  10/10
Tags:
family:hijackloader family:rhadamanthys discovery loader stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Detects HijackLoader (aka IDAT Loader)
Detects Rhadamanthys Payload
HijackLoader
Hijackloader family
Rhadamanthys
Rhadamanthys family
Suspicious use of NtCreateUserProcessOtherParentProcess
Verdict:
Malicious
Tags:
Win.Malware.Wingo-10036258-0
YARA:
n/a
Unpacked files
SH256 hash:
ad3ea6a4067d44f0183645de77363c1bf86b8ea5fd0be55f5611cc408aa4a0a8
MD5 hash:
dcca828d3600e33fb85e5623ec512b11
SHA1 hash:
3916ffcb7800317abeef908e71eba4b63e10fa8f
SH256 hash:
140dbb3121c19f64ababf5da47752988e88aa1b9f9ae6f59e08f64602ad40395
MD5 hash:
3aad6421633d07bb54e662a0f408782a
SHA1 hash:
cbc5fc896570676c3b1c4830a765ae2644226554
SH256 hash:
83e49330a7571e336ef863401c4034d464b772bde3a2effb809d2335e675337e
MD5 hash:
7a4e06c76e90dec6bd218ee1349caee2
SHA1 hash:
8410996f29228a9b4410941c172c4af4d401f626
SH256 hash:
a856451b94782f1aca9c38041037b7a9eab14903f1e274a6c40fc4edb10d4917
MD5 hash:
88622e397e12188bdf723e26020e7341
SHA1 hash:
d297c378f2bc1b0d5d6b3db9cf9f6dbe4b4a43d7
SH256 hash:
aba66259d7e1449fc236b4831a5aadab25e9b6902664a89d23babf54f421ffe8
MD5 hash:
b880740f5b01c3e81a19c2ab359af252
SHA1 hash:
07dfa8cf502d3c54b823f791eda344373a57cec1
SH256 hash:
c6bb5d4f853e5d6ef86deb2656346324c7253297720b9b3fcc22790783532590
MD5 hash:
7463755ab64e76b7cc25678bcc441571
SHA1 hash:
3f21323c4f15ac5f2d57462a9383b65f6daa8d89
SH256 hash:
fb44a831e929567fdb4f581a34c39e5026e9a8411ed0bcb7314a5af936c93ff2
MD5 hash:
587eb6a5d9f1d7519ad13fcf168aa655
SHA1 hash:
becf8fd070e019ae5c0e24bb69f5d9964cab41b4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:HeavensGate
Author:kevoreilly
Description:Heaven's Gate: Switch from 32-bit to 64-mode
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (FORCE_INTEGRITY)high
Reviews
IDCapabilitiesEvidence
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipAlloc
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::AttachConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW

Comments