MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c2e99b8ec6f48cd608d399db524711f08275477f9959c9e962b8175aaf3627b2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 14


Intelligence 14 IOCs YARA 1 File information Comments

SHA256 hash: c2e99b8ec6f48cd608d399db524711f08275477f9959c9e962b8175aaf3627b2
SHA3-384 hash: 1cab26bb14f479a29bae24df70a2a5658180a3ea025f4e23587efdb24a91e04c1071035a1504bd97e3f27d63c39e1f65
SHA1 hash: c98b8173bedd10a3c7f76302ca283edab63d5817
MD5 hash: 5445f15611816ae89d54f873befa3dad
humanhash: green-july-dakota-nine
File name:DropCheats.exe
Download: download sample
Signature Rhadamanthys
File size:5'025'792 bytes
First seen:2025-06-06 18:40:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7d746b91e1e57b358f148ed3374f0079 (41 x Rhadamanthys)
ssdeep 98304:dIwICCEb/b/KU3DZdZjFMqxnz0XQjkd13zjtmSLGO:WO1D/KUZRxz0X1dFtmM
Threatray 135 similar samples on MalwareBazaar
TLSH T1ED3633888EC81DDDC59975B94985FE7C7ABE2BA05161CE3440786FCBB9630B09033E97
TrID 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.6% (.EXE) Win32 Executable (generic) (4504/4/1)
8.5% (.ICL) Windows Icons Library (generic) (2059/9)
8.3% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter burger
Tags:exe Rhadamanthys

Intelligence


File Origin
# of uploads :
1
# of downloads :
524
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
DropCheats.exe
Verdict:
Malicious activity
Analysis date:
2025-06-06 18:36:08 UTC
Tags:
rhadamanthys shellcode

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
90.9%
Tags:
shellcode spawn remo
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Launching a process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RHADAMANTHYS
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Creates an undocumented autostart registry key
Deletes itself after installation
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Early bird code injection technique detected
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes / dynamic malware analysis system (Installed program check)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1708506 Sample: DropCheats.exe Startdate: 06/06/2025 Architecture: WINDOWS Score: 100 95 twc.trafficmanager.net 2->95 97 ts1.aco.net 2->97 99 9 other IPs or domains 2->99 127 Multi AV Scanner detection for submitted file 2->127 129 Yara detected RHADAMANTHYS Stealer 2->129 131 .NET source code contains potential unpacker 2->131 133 3 other signatures 2->133 12 DropCheats.exe 2->12         started        15 msedge.exe 98 358 2->15         started        18 elevation_service.exe 2->18         started        20 3 other processes 2->20 signatures3 process4 dnsIp5 165 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 12->165 167 Switches to a custom stack to bypass stack traces 12->167 22 OpenWith.exe 12->22         started        121 239.255.255.250 unknown Reserved 15->121 26 msedge.exe 15->26         started        28 msedge.exe 15->28         started        30 msedge.exe 15->30         started        32 msedge.exe 15->32         started        signatures6 process7 dnsIp8 107 180.178.189.34, 49697, 49730, 49731 GALAXY-AS-APGalaxyBroadbandPK Pakistan 22->107 143 Deletes itself after installation 22->143 145 Switches to a custom stack to bypass stack traces 22->145 34 OpenWith.exe 8 22->34         started        109 s-part-0029.t-0009.t-msedge.net 13.107.246.57, 443, 49720, 49721 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 26->109 111 150.171.27.11, 443, 49728, 49729 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 26->111 113 8 other IPs or domains 26->113 signatures9 process10 dnsIp11 101 gbg1.ntp.netnod.se 194.58.203.20 NTP-SEAnycastedNTPservicesfromNetnodIXPsSE Sweden 34->101 103 twc.trafficmanager.net 40.119.6.228 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 34->103 105 5 other IPs or domains 34->105 89 C:\Users\user\AppData\...\4tcfKHz8%(.exe, PE32 34->89 dropped 91 C:\Users\user\AppData\Local\...\(S)3Y.exe, PE32+ 34->91 dropped 135 Early bird code injection technique detected 34->135 137 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 34->137 139 Tries to steal Mail credentials (via file / registry access) 34->139 141 7 other signatures 34->141 39 (S)3Y.exe 34->39         started        42 4tcfKHz8%(.exe 34->42         started        45 wmpnscfg.exe 34->45         started        47 3 other processes 34->47 file12 signatures13 process14 file15 147 Query firmware table information (likely to detect VMs) 39->147 149 Modifies windows update settings 39->149 151 Adds a directory exclusion to Windows Defender 39->151 153 Disable Windows Defender notifications (registry) 39->153 49 powershell.exe 39->49         started        52 powershell.exe 39->52         started        54 cmd.exe 39->54         started        67 11 other processes 39->67 93 C:\ProgramData\...\UserOOBEBroker.exe, PE32 42->93 dropped 155 Detected unpacking (changes PE section rights) 42->155 157 Creates an undocumented autostart registry key 42->157 159 Tries to detect sandboxes / dynamic malware analysis system (registry check) 42->159 56 cmd.exe 42->56         started        58 cmd.exe 42->58         started        161 Writes to foreign memory regions 45->161 163 Allocates memory in foreign processes 45->163 60 chrome.exe 47->60         started        63 chrome.exe 47->63         started        65 msedge.exe 47->65         started        signatures16 process17 dnsIp18 123 Loading BitLocker PowerShell Module 49->123 69 conhost.exe 49->69         started        71 conhost.exe 52->71         started        73 net.exe 54->73         started        75 conhost.exe 54->75         started        125 Uses schtasks.exe or at.exe to add and modify task schedules 56->125 83 2 other processes 56->83 77 conhost.exe 58->77         started        115 googlehosted.l.googleusercontent.com 142.250.113.132, 443, 49707, 49708 GOOGLEUS United States 60->115 117 127.0.0.1 unknown unknown 60->117 119 5 other IPs or domains 60->119 79 conhost.exe 67->79         started        81 conhost.exe 67->81         started        85 9 other processes 67->85 signatures19 process20 process21 87 net1.exe 73->87         started       
Threat name:
Win32.Trojan.Rhadamanthys
Status:
Malicious
First seen:
2025-06-06 18:36:08 UTC
File Type:
PE (Exe)
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Deletes itself
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
c2e99b8ec6f48cd608d399db524711f08275477f9959c9e962b8175aaf3627b2
MD5 hash:
5445f15611816ae89d54f873befa3dad
SHA1 hash:
c98b8173bedd10a3c7f76302ca283edab63d5817
Malware family:
Rhadamanthys
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA

Comments