MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Rhadamanthys
Vendor detections: 14
| SHA256 hash: | ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27 |
|---|---|
| SHA3-384 hash: | 77ac4ef54e8afa05d8eb5a80528da00fbde04d83e4c33886874266dd15d685ec120fb977a0ebd95b4731255fca9043bf |
| SHA1 hash: | a31b0ac14c81447b71524e2815be43d9a55ea9f1 |
| MD5 hash: | ee0a93c22584233cc9faf75b7b49bb78 |
| humanhash: | friend-august-river-music |
| File name: | ee0a93c22584233cc9faf75b7b49bb78.exe |
| Download: | download sample |
| Signature | Rhadamanthys |
| File size: | 2'489'984 bytes |
| First seen: | 2024-09-06 17:47:34 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b5a014d7eeb4c2042897567e1288a095 (19 x HijackLoader, 14 x ValleyRAT, 12 x LummaStealer) |
| ssdeep | 49152:+pz3Cy3BkrhfRAXMSxDw7DDCDbNV2ZGomxwF2Nz2k+IsvOYIiPcT:+pey3BkrZRAXMwDuDeh4ZGXeUMSevI9 |
| TLSH | T164B5238033C890F1C23BC939CF5ED3521373F6B967822E9BE5592E651E539D282479E8 |
| TrID | 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 24.6% (.EXE) Win64 Executable (generic) (10523/12/4) 11.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 10.5% (.EXE) Win32 Executable (generic) (4504/4/1) 4.7% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | c292ecd8f2f6fe1c (15 x HijackLoader, 11 x LummaStealer, 7 x Arechclient2) |
| Reporter | |
| Tags: | exe Rhadamanthys |
Intelligence
File Origin
# of uploads :
1
# of downloads :
413
Origin country :
NLVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PENDXGKW.exe
Verdict:
Malicious activity
Analysis date:
2024-08-29 07:03:20 UTC
Tags:
xworm pastebin remote rhadamanthys shellcode
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
Encryption Execution Network Stealth Trojan
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Launching cmd.exe command interpreter
Launching a process
Using the Windows Management Instrumentation requests
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
epmicrosoft_visual_cc fingerprint installer lolbin microsoft_visual_cc overlay packed shell32
Verdict:
Malicious
Labled as:
Trojan.Generic
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
RHADAMANTHYS
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
Score:
75%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Malgent
Status:
Malicious
First seen:
2024-08-29 20:44:00 UTC
File Type:
PE (Exe)
Extracted files:
74
AV detection:
17 of 24 (70.83%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Result
Malware family:
rhadamanthys
Score:
10/10
Tags:
family:rhadamanthys discovery stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Rhadamanthys
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
https://154.216.19.149:2047/888260cc6af8f/pnmx326i.m7ats
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
68bee500e0080f21c003126e73b6d07804d23ac98b2376a8b76c26297d467abe
MD5 hash:
d4dae7149d6e4dab65ac554e55868e3b
SHA1 hash:
b3bea0a0a1f0a6f251bcf6a730a97acc933f269a
SH256 hash:
a6edb3fb6d21dd461da3767a7995034e208f7d6b08997f6cf7ee7b0ea833a8f0
MD5 hash:
cabb58bb5694f8b8269a73172c85b717
SHA1 hash:
9ed583c56385fed8e5e0757ddb2fdf025f96c807
SH256 hash:
1789b08ac26e58b2473a31096c5e678b89c8941797c52e10922e6459ae786680
MD5 hash:
35633596b1bc8b146bd92a598b8e2224
SHA1 hash:
c17c5c9bcd78b48764906e7908292e4e1443ad6d
SH256 hash:
7974aae690d75b2722454529f8b72aeac383e9f6a8779a69c869cc398780c49a
MD5 hash:
6c3d1310d6dabdffd721903ec7c45b27
SHA1 hash:
959bb09b7898382181ea6585aa6144e76f7d92f8
SH256 hash:
ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27
MD5 hash:
ee0a93c22584233cc9faf75b7b49bb78
SHA1 hash:
a31b0ac14c81447b71524e2815be43d9a55ea9f1
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| COM_BASE_API | Can Download & Execute components | ole32.dll::CoCreateInstance ole32.dll::CreateStreamOnHGlobal |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHGetFileInfoW |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CloseHandle KERNEL32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetDriveTypeW KERNEL32.dll::GetStartupInfoA KERNEL32.dll::GetDiskFreeSpaceExW KERNEL32.dll::GetCommandLineW |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateFileW KERNEL32.dll::DeleteFileW KERNEL32.dll::GetSystemDirectoryW KERNEL32.dll::GetFileAttributesW KERNEL32.dll::FindFirstFileW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::CreateWindowExW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.