MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fa26f2383a891ebe64d23f64448c9e5ede3470bb6e6fbf93dbf1c849186fb44b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Rhadamanthys


Vendor detections: 8


Intelligence 8 IOCs YARA 25 File information Comments

SHA256 hash: fa26f2383a891ebe64d23f64448c9e5ede3470bb6e6fbf93dbf1c849186fb44b
SHA3-384 hash: ad66525e85c8f275a48f4751f3abb31092f22ffa4c2c55cc7d48881353ca76adadfc55a7633665a5aa0be03e9744a675
SHA1 hash: 9a6b154c82eb8c68cc105ebc88e276aa784178e9
MD5 hash: 2aa0e1a13c952ed760ab1a10fd877b6e
humanhash: angel-uncle-aspen-cat
File name:python310.dll
Download: download sample
Signature Rhadamanthys
File size:70'913'776 bytes
First seen:2025-08-14 09:56:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e1cfd71a2ac1e1ab37b3be2f2e2b8496 (1 x Rhadamanthys)
ssdeep 1572864:DassmFTiBx3aE7ZLn0bT4fEEMV164gyKUvHOtTIbRXLR9PQwsrhjHRSG:v9Fo3P7ZoIcEMb6qKX0HBQwslj
Threatray 3 similar samples on MalwareBazaar
TLSH T14FF72307ECA184E9C8EAE231967792D2BA717C485B2513D72B60F7346F73BD0AA74350
TrID 44.4% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter burger
Tags:exe Rhadamanthys

Intelligence


File Origin
# of uploads :
1
# of downloads :
100
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
python310.dll
Verdict:
No threats detected
Analysis date:
2025-08-14 09:52:00 UTC
Tags:
python golang

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Result
Threat name:
RHADAMANTHYS
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Changes memory attributes in foreign processes to executable or writable
Creates a thread in another existing process (thread injection)
Early bird code injection technique detected
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Injects code into the Windows Explorer (explorer.exe)
Maps a DLL or memory area into another process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Sigma detected: RunDLL32 Spawning Explorer
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (Installed program check)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1756756 Sample: python310.dll.exe Startdate: 14/08/2025 Architecture: WINDOWS Score: 100 65 time.windows.com 2->65 67 olx188login.com 2->67 69 12 other IPs or domains 2->69 95 Found malware configuration 2->95 97 Antivirus detection for dropped file 2->97 99 Yara detected RHADAMANTHYS Stealer 2->99 101 3 other signatures 2->101 11 loaddll64.exe 1 2->11         started        13 elevation_service.exe 2->13         started        15 elevation_service.exe 2->15         started        17 2 other processes 2->17 signatures3 process4 process5 19 rundll32.exe 11->19         started        22 rundll32.exe 11->22         started        24 cmd.exe 1 11->24         started        26 3 other processes 11->26 signatures6 103 Changes memory attributes in foreign processes to executable or writable 19->103 105 Injects code into the Windows Explorer (explorer.exe) 19->105 107 Writes to foreign memory regions 19->107 28 explorer.exe 2 19->28 injected 109 System process connects to network (likely due to code injection or exploit) 22->109 111 Allocates memory in foreign processes 22->111 113 Creates a thread in another existing process (thread injection) 22->113 30 explorer.exe 40 124 22->30         started        34 rundll32.exe 24->34         started        115 Found Tor onion address 26->115 process7 dnsIp8 36 OpenWith.exe 8 28->36         started        41 WerFault.exe 4 28->41         started        91 ax-0003.ax-msedge.net 150.171.27.12, 443, 49696 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 30->91 125 System process connects to network (likely due to code injection or exploit) 30->125 127 Query firmware table information (likely to detect VMs) 30->127 93 olx188login.com 87.120.166.160, 443, 49691, 49692 BURDENIS-ASBG Bulgaria 34->93 129 Changes memory attributes in foreign processes to executable or writable 34->129 131 Injects code into the Windows Explorer (explorer.exe) 34->131 133 Writes to foreign memory regions 34->133 135 2 other signatures 34->135 signatures9 process10 dnsIp11 83 time-a-g.nist.gov 129.6.15.28 US-NATIONAL-INSTITUTE-OF-STANDARDS-AND-TECHNOLOGYUS United States 36->83 85 x.ns.gin.ntt.net 129.250.35.250 NTT-COMMUNICATIONS-2914US United States 36->85 87 8 other IPs or domains 36->87 61 C:\Users\user\AppData\Local\...\85aeta[.exe, PE32 36->61 dropped 63 C:\Users\user\AppData\...\)4]b}y5(7d.exe, PE32+ 36->63 dropped 117 Early bird code injection technique detected 36->117 119 Found evasive API chain (may stop execution after checking mutex) 36->119 121 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 36->121 123 8 other signatures 36->123 43 msedge.exe 36->43         started        46 chrome.exe 36->46         started        48 chrome.exe 36->48         started        file12 signatures13 process14 dnsIp15 89 239.255.255.250 unknown Reserved 43->89 50 msedge.exe 43->50         started        53 msedge.exe 43->53         started        55 msedge.exe 43->55         started        57 chrome.exe 46->57         started        59 chrome.exe 46->59         started        process16 dnsIp17 71 clients2.googleusercontent.com 50->71 73 ln-0007.ln-msedge.net 150.171.22.17, 443, 49723 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 50->73 79 5 other IPs or domains 50->79 75 clients2.googleusercontent.com 57->75 77 142.250.65.161, 443, 49720, 49733 GOOGLEUS United States 57->77 81 3 other IPs or domains 57->81
Gathering data
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2025-08-14 00:06:07 UTC
File Type:
PE+ (Dll)
AV detection:
5 of 24 (20.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Malware family:
Rhadamanthys
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:DetectGoMethodSignatures
Author:Wyatt Tauber
Description:Detects Go method signatures in unpacked Go binaries
Rule name:Detect_Go_GOMAXPROCS
Author:Obscurity Labs LLC
Description:Detects Go binaries by the presence of runtime.GOMAXPROCS in the runtime metadata
Rule name:GoBinTest
Rule name:golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:golang_duffcopy_amd64
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:ProgramLanguage_Golang
Author:albertzsigovits
Description:Application written in Golang programming language
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments