MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 daf00060645bade6bd31ad4d586a1f12adaa07f5f96486f70c59c1653384cc37. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: daf00060645bade6bd31ad4d586a1f12adaa07f5f96486f70c59c1653384cc37
SHA3-384 hash: f497ca27a86c41a1e85d9d30582a44c78d0b562e18a50e9fc4c8e43e8ae9f0e68c12f4dfd50f7fa318ef8ecdab19a69d
SHA1 hash: 6990fadb8d7843808309fd929cbfd6a24e1db630
MD5 hash: 93b177cb6f0585dc92b8236edc33a1d7
humanhash: emma-georgia-bluebird-rugby
File name:file
Download: download sample
Signature Rhadamanthys
File size:1'048'576 bytes
First seen:2025-10-17 04:04:10 UTC
Last seen:2025-10-20 04:09:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1117dbeb097f01310598f34a3011fcaa (2 x Rhadamanthys)
ssdeep 3072:fC8mN3iQ4p6ZSXEa0mXRdn7gKDu1Y41KECNCY9Aoohk:fC8QSRp6ZSUaXXRB7d61HwpCY9Ajk
TLSH T1A2255C4BB3A430F9E1778139C8921A41E77278355760ABDF03A0877A2F276D19D3EB61
TrID 48.7% (.EXE) Win64 Executable (generic) (10522/11/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter Bitsight
Tags:dropped-by-amadey exe Rhadamanthys


Avatar
Bitsight
url: http://178.16.55.189/files/7782139129/L820xtt.exe

Intelligence


File Origin
# of uploads :
18
# of downloads :
78
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
daf00060645bade6bd31ad4d586a1f12adaa07f5f96486f70c59c1653384cc37.bin.exe
Verdict:
No threats detected
Analysis date:
2025-10-16 19:55:36 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
ransomware downloader dropper
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending an HTTP GET request to an infection source
Creating a file
Creating a process from a recently created file
Сreating synchronization primitives
Connection attempt
Sending an HTTP GET request
Launching a process
Launching the default Windows debugger (dwwin.exe)
Connection attempt to an infection source
Launching a file downloaded from the Internet
Unauthorized injection to a recently created process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm fingerprint lolbin microsoft_visual_cc overlay rundll32 stealer unsafe
Verdict:
Malicious
Labled as:
Win64/Agent_AGeneric.HPA trojan
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-10-16T17:32:00Z UTC
Last seen:
2025-10-17T10:09:00Z UTC
Hits:
~1000
Detections:
VHO:Trojan-PSW.Win32.BroPass.gen Trojan-PSW.Win32.Greedy.sb PDM:Trojan.Win32.Generic Trojan-PSW.MSIL.Stealer.sb Trojan-Downloader.Agent.HTTP.C&C Trojan-Spy.Stealer.HTTP.C&C Trojan-PSW.Win32.Agent.sba Trojan-Downloader.Win32.Inject.sb HEUR:Trojan-PSW.Win32.Disco.gen VHO:Trojan-Spy.Win32.Stealer.fngk VHO:Trojan-PSW.Win32.Convagent.gen Trojan-PSW.Win32.Disco.sb Trojan-PSW.Win64.Coins.bjd Trojan-PSW.Win32.Coins.sb HEUR:Trojan-PSW.Python.Nuker.gen HEUR:Trojan-PSW.Multi.Disco.gen UDS:DangerousObject.Multi.Generic VHO:Trojan-Spy.Win32.Stealer.fngl Trojan.Win32.Inject.sb Trojan-PSW.Win32.Stealer.sb HEUR:Trojan-PSW.Python.HashBreaker.b HEUR:Trojan-PSW.Python.Agent.gen VHO:Trojan-PSW.Win32.Agent.gen VHO:Trojan-Spy.Win32.Stealer.gen Trojan-Spy.Win32.Stealer.fngk VHO:Trojan-PSW.Win64.Coins.bjd
Gathering data
Verdict:
Malicious
Threat:
VHO:Trojan-PSW.Win64.Coins
Threat name:
Win64.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-10-16 19:55:37 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery pyinstaller spyware stealer upx
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Browser Information Discovery
Detects Pyinstaller
UPX packed file
Checks installed software on the system
Looks up external IP address via web service
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Badlisted process makes network request
Downloads MZ/PE file
Unpacked files
SH256 hash:
daf00060645bade6bd31ad4d586a1f12adaa07f5f96486f70c59c1653384cc37
MD5 hash:
93b177cb6f0585dc92b8236edc33a1d7
SHA1 hash:
6990fadb8d7843808309fd929cbfd6a24e1db630
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Rhadamanthys

Executable exe daf00060645bade6bd31ad4d586a1f12adaa07f5f96486f70c59c1653384cc37

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments