

Multiple Adobe Substance3D and Adobe Photoshop Vulnerabilities
January 22, 2025
Multiple Oracle Products Vulnerabilities
January 22, 2025
Multiple Adobe Substance3D and Adobe Photoshop Vulnerabilities
January 22, 2025
Multiple Oracle Products Vulnerabilities
January 22, 2025Severity
Medium
Analysis Summary
Rhadamanthys is a type of malware known as a stealer, which is designed to steal sensitive information from infected computers. It was first identified in 2020 and has been active since then. The malware is spread through phishing emails and is designed to evade detection by antivirus software. Once installed on a victim's computer, Rhadamanthys steals a variety of sensitive information, including passwords, browser cookies, cryptocurrency wallets, and files containing personal and financial information. The stolen data is then exfiltrated to a remote server controlled by the malware's operators.
Rhadamanthys uses several techniques to evade detection and analysis, including encrypting its communications with the remote server, using anti-debugging and anti-VM techniques, and using steganography to hide its configuration files. The malware is highly customizable and can be adapted to target specific types of information or systems. It is also capable of downloading additional modules or payloads, which can be used to expand its capabilities or to carry out additional attacks.
Impact
- Credential Theft
- Unauthorized Access
- Information Theft
Indicators of Compromise
Domain Name
- floratrans.live
MD5
73ff8e6c77c44c0d26b83e29c95b99cc
756219b350b87a85f693dccbbf4cbc1e
SHA-256
0f28f752654c366c26dcdb3f167e36a3fef3632cea24f19a3cf8bea9e5553835
7dff620d738f6ca95281cdd0c9574a384f99ae0f02aeab4d9b0b5379b79ca1cb
SHA1
b9fc307b152ec9950a11a7f7bed03b3c47e56ec9
74b914eecde695b919f9474609bd1c3b95d3d48e
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.