BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

Rhadamanthys

65
Global rank
17 infographic chevron month
Month rank
16 infographic chevron week
Week rank
953
IOCs

Rhadamanthys is a C++ information-stealing malware that extracts sensitive data from infiltrated machines. Its layered operational chain and advanced evasion tactics make it a major risk in cybersecurity landscapes.

Stealer
Type
Unknown
Origin
26 September, 2022
First seen
27 April, 2024
Last seen

How to analyze Rhadamanthys with ANY.RUN

Type
Unknown
Origin
26 September, 2022
First seen
27 April, 2024
Last seen

IOCs

IP addresses
185.196.10.233
20.218.68.91
91.92.249.37
94.156.8.44
217.63.234.90
31.41.244.38
195.123.219.158
195.3.223.120
95.111.233.125
189.245.155.48
45.15.159.42
81.17.28.78
190.140.74.43
138.36.3.134
189.245.97.177
187.156.109.2
187.224.55.97
87.251.64.231
142.11.236.5
187.233.22.167
Hashes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mail.officeemailbackup.com
triangleseasonbenchwj.shop
culturesketchfinanciall.shop
modestessayevenmilwek.shop
claimconcessionrebe.shop
peasanthovecapspll.shop
gemcreedarticulateod.shop
sofahuntingslidedine.shop
secretionsuitcasenioise.shop
liabilityarrangemenyit.shop
rootsaul.duckdns.org
applereports.ddns.net
indscpm.xyz
dbeight8pt.top
kbeight8pn.top
kveight8sb.top
kbeight8vs.top
kbeight8ht.top
kzeight8ht.top
daikenn.club
URLs
http://162.33.178.106/gjntrrm/zznb2o.hgfq
http://179.43.142.201/img/favicon.png
http://amxt25.xyz/a6ba5b1ae6dec5f7c/8tkf22v9.ed2jd
http://amx155.xyz/a6ba5b1ae6dec5f7c/j5e4ok98.h44x9
http://212.193.30.32/upload/libssl.dll
http://193.42.33.123:443/wgetlist/in60fc.j42a
http://31.220.57.50/abctop/oy7xup.thms
http://8002.motorline.pw/api/9wcnem.x0vs
http://79.137.195.45:8080/api/purple
http://perfecto.ac.ug/ggkanor/0mv8dc.bqmu
http://185.224.129.51:8080/modlib/79q4x9.fkc9
http://8002.motorline.pw/api/mpnz0d.fxbz
http://185.224.129.51:8080/modlib/o6u3ke.661c
http://turkie.ac.ug/url/yk/rem.exe
http://api.mylangroups.com/api/59ywc1.5oic
http://144.76.33.241/fredom/YTmeta.api
http://185.224.129.51:8080/modlib/8q85xm.zmam
http://79.137.195.45:8080/api/magic
http://79.137.195.45:8080/api/hello
http://79.137.195.45:8080/api/CRYPTORPROLIV
Last Seen at
Last Seen at

Recent blog posts

post image
New Redline Version: Uses Lua Bytecode, Propa...
watchers 110
comments 0
post image
Find Malware by File Contents with YARA Searc...
watchers 1030
comments 0
post image
Cybercriminals Exploit Google Ads to Spread I...
watchers 473
comments 0

What is Rhadamanthys Stealer Malware

First observed in late 2022, Rhadamanthys is an advanced info-stealer that targets Windows platforms. It is distributed through the malware-as-a-service (MaaS) model. This, in conjunction with its extremely robust and diverse malicious capabilities contributes to the rising popularity of this malware.

Similar to threats like RedLine or Raccoon, utilizing this new strain, threat actors can extract user passwords and exfiltrate sensitive data from infiltrated systems. The info-stealer also presents a significant threat to various cryptocurrency platforms, where it's employed to seize user credentials and wallets.

Certain indicators suggest that Rhadamanthys stealer has the potential to evolve into a pervasive threat. Notably, the malware's initial launch demonstrated signs of meticulous planning. The individual who first introduced it on an underground forum, operating under the pseudonym "kingcrete2022", began building his account's reputation well in advance of the release announcement. This proactive strategy aimed to establish credibility and set the stage for the malware's introduction.

The tactic proved successful, as the debut post, which promoted Rhadamanthys as a "first-class" stealer, quickly gained momentum and attracted attention in the underground community.

As it stands, Rhadamanthys indiscriminately attacks targets worldwide, even reaching into the territories of the former USSR. The malware has been identified in several malicious spam and Google Ads campaigns, but more on this later in the article.

It should be noted, that Rhadamanthys stealer employs a design philosophy that aims to incorporate an expansive list of features. These features are not strategically targeted but rather prioritize extensive capability. For example, malware is, rather unnecessarily, equipped with capabilities to steal data from web browsers such as KMeleon and Pale Moon, and to steal cryptocurrency from obscure browser extensions like Firefox's Auvitas Wallet.

In terms of system information extraction, Rhadamanthys can capture a wide array of data. This includes:

-Computer name, username, RAM capacity, CPU cores, screen resolution

-Installed software, cookies, browsing history

-Saved credit cards and other sensitive information

Furthermore, Rhadamanthys targets credentials from a vast range of sources: FTP clients like Cyberduck and TotalCommander, mail clients such as Outlook and Thunderbird, and password managers like RoboForm and KeePass. It also has the capacity to extract information from VPN services, note-taking applications, messenger applications, and other services like Steam, TeamViewer, and SecureCRT.

Rhadamanthys shows a particular interest in cryptocurrency. One of its version updates had nearly half of its new features dedicated to exfiltrating and cracking cryptocurrency wallets. The list of targeted wallets is quite extensive and includes Auvitas, BitApp, Crocobit, Exodus, Finnie, ICONex, Metamask, and more.

In addition to the automatic actions, Rhadamanthys also allows for direct intervention by attackers. The malware offers a functionality to push new configurations to the “file grabbing” module, allowing specific files to be exfiltrated. For a more hands-on approach, attackers can execute hand-crafted PowerShell scripts on the victim machine. This added flexibility provides a high degree of control over the infected system.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Rhadamanthys Stealer Technical Details

Written in C++, Rhadamanthys employs a number of sophisticated techniques to ensure its stealth and efficacy. Its operational chain is usually divided into three components:

-the Dropper,

-the Rhadamanthys Loader (second shellcode)

-and the Rhadamanthys Stealer (Nsis module).

In one attack observed the wild, the Dropper initiated the process by executing the shellcode through a callback function. This bypassesed common security measures that track shellcode execution methods like CreateThread or CreateRemoteThread.

Next, the Rhadamanthys Loader, or the second shellcode, comes into play. This shellcode uses several evasion methods. It manipulates exception handling to maintain low visibility, creates a Mutex to simulate legitimate processes, and unhooks API calls to avoid detection. In addition to these, it is responsible for decrypting the malware configuration and managing its network functions.

Lastly, the Rhadamanthys Stealer, or the Nsis module, is activated. Some samples have the ability to manipulate AVAST’s AMSI-related modules to avoid detection. It is this component that ultimately executes the data theft.

Rhadamanthys Stealer Dynamic Analysis

Being a stealer, Rhadamanthys tries to operate as secretively as possible, remaining under the radar and avoiding detection. The malicious activity starts right after infection — Rhadamanthys extracts information from the system and tries to send it to the Command & Control servers.

The execution chain may vary a little — some versions of the Trojan have the ability to inject into system processes, while others simply execute themselves.

It also may delay execution and sleep for some time after infection or use utilities like PowerShell to run commands.

Rhadamanthys’s network traffic Rhadamanthys’s network traffic

Thanks to the network packets structure, Rhadamanthys can be detected by Suricata rules.

Rhadamanthys Stealer Distribution Methods

Rhadamanthys info-stealer employs a couple of key strategies to infiltrate systems. One of its infamous шstribution techniques involves hijacking Google ads, where it covertly replaces the original content with a link to the malware.

It also uses phishing webpages and malicious spam for propagation. In malspam campaigns, a PDF file triggers victims to download the malware. The PDF file was observed presenting a fake Adobe Acrobat DC software update prompt which, when clicked, initiates the execution of the malware.

In phishing-based distribution, the malware creators build fake webpages mimicking legitimate services like Zoom or AnyDesk. Links to these fraudulent sites are then spread via Google ads. These malicious sites facilitate the download of the Rhadamanthys infostealer disguised as a legitimate installer. Consequently, the target unknowingly downloads the malware without noticing the infection.

Conclusion

Boasting an extensive stealing feature set that may well be unmatched among similar types of malware, Rhadamanthys has the potential to emerge as a significant threat in the cybersecurity landscape. We strongly recommend analysts to delve into this threat while it's still relatively new on the scene.

Conveniently, dynamic analysis of Rhadamanthys can be easily carried out on platforms such as ANY.RUN — our cloud interactive sandbox allows for a deeper understanding of its execution process and facilitates the collection of valuable Indicators of Compromise (IOCs).

Investigating the nuances of Rhadamanthys not only aids in its containment but also prepares us for future threats that may adopt a similar design strategy.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy