| File name: | 8651f126047222ca0273f9d0000681538a5847f7e4a45f62af497f934df014e1.bin |
| Full analysis: | https://app.any.run/tasks/bb0f8379-6945-436e-89e1-eb0c2d185467 |
| Verdict: | Malicious activity |
| Threats: | Rhadamanthys is a C++ information-stealing malware that extracts sensitive data from infiltrated machines. Its layered operational chain and advanced evasion tactics make it a major risk in cybersecurity landscapes. |
| Analysis date: | April 02, 2025, 15:49:11 |
| OS: | Windows 11 Professional (build: 22000, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections |
| MD5: | F23E6E3F6C6F23D50F7B917E80F0E109 |
| SHA1: | A311F76FF18DB8EA2412FA6A1E5BF1D043C38E91 |
| SHA256: | 8651F126047222CA0273F9D0000681538A5847F7E4A45F62AF497F934DF014E1 |
| SSDEEP: | 98304:0txCe9/r2z0YDB66OMekRaQGvrGvvU3jTEw+jp7MRytt1s4a0Yw5:Q/o |
| .exe | | | Inno Setup installer (92.8) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (3.8) |
| .exe | | | Generic Win/DOS Executable (1.6) |
| .exe | | | DOS Executable Generic (1.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:04:14 16:10:23+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 2900480 |
| InitializedDataSize: | 240640 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x2c5660 |
| OSVersion: | 6.1 |
| ImageVersion: | 6 |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.22.2.0 |
| ProductVersionNumber: | 0.22.2.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | Mystix LLC |
| FileDescription: | Mystix, the innovative blockchain game |
| FileVersion: | 0.22.2 |
| LegalCopyright: | Copyright (C) 2014-2025 Mystix Team |
| Info: | https://mystix-verse.com |
| ProductVersion: | 0.22.2 |
| ProductName: | Mystix |
| InternalName: | Mystix |
| OriginalFileName: | mystix.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 856 | "C:\Users\admin\Desktop\8651f126047222ca0273f9d0000681538a5847f7e4a45f62af497f934df014e1.bin.exe" | C:\Users\admin\Desktop\8651f126047222ca0273f9d0000681538a5847f7e4a45f62af497f934df014e1.bin.exe | — | explorer.exe | |||||||||||
User: admin Company: Mystix LLC Integrity Level: MEDIUM Description: Mystix, the innovative blockchain game Version: 0.22.2 Modules
| |||||||||||||||
| 4568 | "C:\Users\admin\Desktop\8651f126047222ca0273f9d0000681538a5847f7e4a45f62af497f934df014e1.bin.exe" | C:\Users\admin\Desktop\8651f126047222ca0273f9d0000681538a5847f7e4a45f62af497f934df014e1.bin.exe | — | explorer.exe | |||||||||||
User: admin Company: Mystix LLC Integrity Level: MEDIUM Description: Mystix, the innovative blockchain game Exit code: 0 Version: 0.22.2 Modules
| |||||||||||||||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2860 | smartscreen.exe | GET | 200 | 208.89.74.19:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?fe9e5e0a08b0a028 | unknown | — | — | whitelisted |
— | — | HEAD | 200 | 23.199.214.10:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | — | — | — |
1352 | svchost.exe | GET | 200 | 23.32.239.82:80 | http://www.msftconnecttest.com/connecttest.txt | unknown | — | — | whitelisted |
2768 | svchost.exe | GET | 200 | 95.101.74.219:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?b5c209eb39f9a373 | unknown | — | — | whitelisted |
2768 | svchost.exe | GET | 200 | 95.101.74.219:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?ae0cec35f73e7201 | unknown | — | — | whitelisted |
2768 | svchost.exe | GET | 200 | 95.101.74.219:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?3e0b4dd42efe063e | unknown | — | — | whitelisted |
2768 | svchost.exe | GET | 200 | 95.101.74.219:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?c10bf6f6673bef07 | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.199.214.10:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | binary | 55 b | whitelisted |
— | — | POST | 200 | 172.211.159.152:443 | https://checkappexec.microsoft.com/windows/shell/actions | unknown | binary | 182 b | whitelisted |
— | — | POST | 200 | 40.79.197.34:443 | https://self.events.data.microsoft.com/OneCollector/1.0/ | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 23.32.239.16:80 | — | Akamai International B.V. | DE | unknown |
2860 | smartscreen.exe | 20.191.45.158:443 | checkappexec.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2860 | smartscreen.exe | 208.89.74.19:80 | ctldl.windowsupdate.com | — | US | whitelisted |
1352 | svchost.exe | 23.32.239.82:80 | — | Akamai International B.V. | DE | unknown |
2412 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3952 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4252 | svchost.exe | 23.199.214.10:443 | fs.microsoft.com | AKAMAI-AS | DE | whitelisted |
2988 | OfficeClickToRun.exe | 13.89.179.9:443 | self.events.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
2768 | svchost.exe | 95.101.74.219:80 | ctldl.windowsupdate.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
checkappexec.microsoft.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
dns.msftncsi.com |
| whitelisted |
fs.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Generic Protocol Command Decode | SURICATA HTTP Request unrecognized authorization method |
1352 | svchost.exe | Misc activity | ET INFO Microsoft Connection Test |