MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e4b72ede86422c14033614daff35a37789e14193ec31a07284d27a64bcb56269. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: e4b72ede86422c14033614daff35a37789e14193ec31a07284d27a64bcb56269
SHA3-384 hash: 1a4247d53dcd9c1807ceca6c2b994488641779784991512729729d57136c2c41815b238bfb01a37872e1105aa1a3641b
SHA1 hash: d6bb82a82742496af02723094afe5e394b329018
MD5 hash: 4740364a8026b5c062f7ee48006c3cef
humanhash: hotel-uncle-quebec-florida
File name:appFile_patched.exe
Download: download sample
Signature Rhadamanthys
File size:101'838'846 bytes
First seen:2025-05-23 20:47:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bf95d1fc1d10de18b32654b123ad5e1f (327 x LummaStealer, 65 x Rhadamanthys, 25 x Vidar)
ssdeep 24576:I0a6Tbe/y7a0syS3j/IPchYd/C6QobCwPeNwXz3kaxp8eMa3obOI:In1XbIiYNtnPeNulxp8yvI
Threatray 389 similar samples on MalwareBazaar
TLSH T1982823D2F7B5528E5513AA7126A60C833B3E76F6D25001257A41B21D34E6F20A3BF63F
TrID 37.3% (.EXE) Win64 Executable (generic) (10522/11/4)
17.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.9% (.EXE) Win32 Executable (generic) (4504/4/1)
7.3% (.ICL) Windows Icons Library (generic) (2059/9)
7.2% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon 1cdc82a282fc3e03 (1 x Rhadamanthys)
Reporter aachum
Tags:45-153-34-122 AutoIT CypherIT de-pumped exe Rhadamanthys


Avatar
iamaachum
https://med1a.n1t843se3.cyou/Internet_Download_Manager_%28IDM%29_v6.42_Build_36_%2B_Fix_%5BLifetime_A.zip?c=AGbbMGgvYwUAXFgCAEVTFwAMAAAAAACy&s=353071 => https://arch.dow034.cfd/g/zip/L030wg54k5YVhqXLMskIZdy7/Internet_Download_Manager_(IDM)_v6.42_Build_36_+_Fix_%5BLifetime_A.zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
862
Origin country :
ES ES
Vendor Threat Intelligence
Verdict:
Malicious
Score:
97.4%
Tags:
autoit emotet cobalt
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% directory
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Launching a process
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Creating a file
Creating a process from a recently created file
DNS request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
blackhole installer microsoft_visual_cc overlay overlay packed packer_detected
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Drops PE files with a suspicious file extension
Early bird code injection technique detected
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sigma detected: Search for Antivirus process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses threadpools to delay analysis
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1698252 Sample: appFile_patched.exe Startdate: 23/05/2025 Architecture: WINDOWS Score: 100 54 uhkwoMHulJfv.uhkwoMHulJfv 2->54 56 twc.trafficmanager.net 2->56 58 10 other IPs or domains 2->58 70 Multi AV Scanner detection for submitted file 2->70 72 Sigma detected: Search for Antivirus process 2->72 74 .NET source code contains potential unpacker 2->74 76 Joe Sandbox ML detected suspicious sample 2->76 11 appFile_patched.exe 27 2->11         started        13 elevation_service.exe 2->13         started        15 elevation_service.exe 2->15         started        17 2 other processes 2->17 signatures3 process4 process5 19 cmd.exe 3 11->19         started        file6 46 C:\Users\user\AppData\Local\...\Tracy.com, PE32 19->46 dropped 78 Drops PE files with a suspicious file extension 19->78 23 Tracy.com 19->23         started        27 cmd.exe 2 19->27         started        29 extrac32.exe 15 19->29         started        31 8 other processes 19->31 signatures7 process8 dnsIp9 60 45.153.34.122, 49695, 8888 SKYLINKNL Germany 23->60 82 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 23->82 84 Uses threadpools to delay analysis 23->84 86 Switches to a custom stack to bypass stack traces 23->86 88 Found direct / indirect Syscall (likely to bypass EDR) 23->88 33 OpenWith.exe 3 23->33         started        37 WerFault.exe 2 23->37         started        signatures10 process11 dnsIp12 48 ntp1.net.berkeley.edu 169.229.128.134, 123, 53643 UCBUS United States 33->48 50 ntp.time.nl 94.198.159.10, 123, 53643 SIDNNL Netherlands 33->50 52 4 other IPs or domains 33->52 62 Early bird code injection technique detected 33->62 64 Found many strings related to Crypto-Wallets (likely being stolen) 33->64 66 Tries to harvest and steal browser information (history, passwords, etc) 33->66 68 2 other signatures 33->68 39 chrome.exe 33->39         started        42 chrome.exe 33->42         started        signatures13 process14 signatures15 80 Found many strings related to Crypto-Wallets (likely being stolen) 39->80 44 chrome.exe 39->44         started        process16
Gathering data
Threat name:
Win32.Adware.RedCap
Status:
Malicious
First seen:
2025-05-23 20:48:43 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
8 of 38 (21.05%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Windows directory
Enumerates processes with tasklist
Checks computer location settings
Deletes itself
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Rhadamanthys

Executable exe e4b72ede86422c14033614daff35a37789e14193ec31a07284d27a64bcb56269

(this sample)

  
Delivery method
Distributed via web download

Comments