MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cbb21348582932ab0b31c23529c0cf675ba8b40f85f373d9a33b2853aedd1c16. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: cbb21348582932ab0b31c23529c0cf675ba8b40f85f373d9a33b2853aedd1c16
SHA3-384 hash: fea1dee9937f450ebce8262909552d6e1de635099333d6f3c6628d6e35a8daf386a4aef322de44299d755cd05eed4fd3
SHA1 hash: a43944fe636052fc1a6fcc34c25fd41f08a28c2c
MD5 hash: 5d38abb1f12dde4a5e035caeb86c0004
humanhash: skylark-mirror-mountain-nevada
File name:5d38abb1f12dde4a5e035caeb86c0004.exe
Download: download sample
Signature Rhadamanthys
File size:1'264'043 bytes
First seen:2024-01-15 16:15:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 83f14d2767a043eb238d8cc2259b7621 (1 x Rhadamanthys)
ssdeep 24576:vs4vtQwtAr/bTGukwsdVv9vZFhNtKeRZq97dJp8b4Zu6MX0:NKwtAr9x8v9RDUpdJpO+N
Threatray 1'888 similar samples on MalwareBazaar
TLSH T14C450112ABE15175F5F30F302EF86AA48BBABD225E10C94F1354261E5E70A81EE35377
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon e183a3b49291a4cc (1 x Rhadamanthys)
Reporter abuse_ch
Tags:exe Rhadamanthys

Intelligence


File Origin
# of uploads :
1
# of downloads :
330
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
hook installer keylogger lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RHADAMANTHYS
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Contains functionality to register a low level keyboard hook
Drops PE files with a suspicious file extension
Found API chain indicative of debugger detection
Found API chain indicative of sandbox detection
Injects a PE file into a foreign processes
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ipconfig to lookup or modify the Windows network settings
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1374888 Sample: 6s31geFb1Y.exe Startdate: 15/01/2024 Architecture: WINDOWS Score: 100 77 iplogger.com 2->77 79 hsMtLwFfgmPznjTBnOJBAaViLRAT.hsMtLwFfgmPznjTBnOJBAaViLRAT 2->79 83 Snort IDS alert for network traffic 2->83 85 Multi AV Scanner detection for submitted file 2->85 87 Yara detected RHADAMANTHYS Stealer 2->87 89 4 other signatures 2->89 13 6s31geFb1Y.exe 14 2->13         started        17 wscript.exe 1 1 2->17         started        signatures3 process4 file5 73 C:\Users\user\AppData\Local\Temp\...\Foul, PE32 13->73 dropped 111 Contains functionality to register a low level keyboard hook 13->111 19 cmd.exe 1 13->19         started        22 conhost.exe 13->22         started        113 Windows Scripting host queries suspicious COM object (likely to drop second stage) 17->113 24 EduLynx.pif 13 17->24         started        signatures6 process7 signatures8 91 Uses ping.exe to sleep 19->91 93 Drops PE files with a suspicious file extension 19->93 95 Uses ping.exe to check the status of other devices and networks 19->95 26 cmd.exe 1 19->26         started        29 conhost.exe 19->29         started        97 Writes to foreign memory regions 24->97 99 Injects a PE file into a foreign processes 24->99 31 ipconfig.exe 24->31         started        process9 signatures10 109 Uses ping.exe to sleep 26->109 33 Kazakhstan.pif 16 26->33         started        38 cmd.exe 2 26->38         started        40 cmd.exe 2 26->40         started        46 6 other processes 26->46 42 WerFault.exe 31->42         started        44 WerFault.exe 31->44         started        process11 dnsIp12 75 iplogger.com 172.67.188.178, 443, 49701, 49703 CLOUDFLARENETUS United States 33->75 67 C:\Users\user\AppData\Local\...duLynx.pif, PE32 33->67 dropped 101 Found API chain indicative of debugger detection 33->101 103 Found API chain indicative of sandbox detection 33->103 105 Drops PE files with a suspicious file extension 33->105 107 3 other signatures 33->107 48 ipconfig.exe 1 33->48         started        50 cmd.exe 2 33->50         started        69 C:\Users\user\AppData\...\Kazakhstan.pif, PE32 38->69 dropped file13 signatures14 process15 file16 53 dialer.exe 48->53         started        56 WerFault.exe 48->56         started        58 WerFault.exe 48->58         started        71 C:\Users\user\AppData\Roaming\...duLynx.url, MS 50->71 dropped 60 conhost.exe 50->60         started        process17 dnsIp18 81 213.226.123.26, 1845, 49711, 49712 E-STYLEISP-ASRU Russian Federation 53->81 62 OpenWith.exe 53->62         started        process19 signatures20 115 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 62->115 117 Tries to steal Mail credentials (via file / registry access) 62->117 119 Tries to harvest and steal browser information (history, passwords, etc) 62->119 121 Tries to harvest and steal Bitcoin Wallet information 62->121 65 wmplayer.exe 62->65         started        process21
Threat name:
Win32.Spyware.Rhadamanthys
Status:
Malicious
First seen:
2024-01-14 22:11:22 UTC
File Type:
PE (Exe)
Extracted files:
20
AV detection:
14 of 38 (36.84%)
Threat level:
  2/5
Result
Malware family:
rhadamanthys
Score:
  10/10
Tags:
family:rhadamanthys stealer
Behaviour
Enumerates processes with tasklist
Gathers network information
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Rhadamanthys
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
cbb21348582932ab0b31c23529c0cf675ba8b40f85f373d9a33b2853aedd1c16
MD5 hash:
5d38abb1f12dde4a5e035caeb86c0004
SHA1 hash:
a43944fe636052fc1a6fcc34c25fd41f08a28c2c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Rhadamanthys

Executable exe cbb21348582932ab0b31c23529c0cf675ba8b40f85f373d9a33b2853aedd1c16

(this sample)

  
Delivery method
Distributed via web download

Comments