

Multiple Microsoft Products Vulnerabilities
April 10, 2025
ICS: Multiple Rockwell Automation Arena Vulnerabilities
April 10, 2025
Multiple Microsoft Products Vulnerabilities
April 10, 2025
ICS: Multiple Rockwell Automation Arena Vulnerabilities
April 10, 2025Severity
Medium
Analysis Summary
Rhadamanthys is a type of malware known as a stealer, which is designed to steal sensitive information from infected computers. It was first identified in 2020 and has been active since then. The malware is spread through phishing emails and is designed to evade detection by antivirus software. Once installed on a victim's computer, Rhadamanthys steals a variety of sensitive information, including passwords, browser cookies, cryptocurrency wallets, and files containing personal and financial information. The stolen data is then exfiltrated to a remote server controlled by the malware's operators.
Rhadamanthys uses several techniques to evade detection and analysis, including encrypting its communications with the remote server, using anti-debugging and anti-VM techniques, and using steganography to hide its configuration files. The malware is highly customizable and can be adapted to target specific types of information or systems. It is also capable of downloading additional modules or payloads, which can be used to expand its capabilities or to carry out additional attacks.
Impact
- Credential Theft
- Unauthorized Access
- Information Theft
Indicators of Compromise
MD5
57edf902e60a77dae78e3378e8834eea
099cbd1161cd2f0256cca3c7cb163574
ec8d83cd891f87e2a0a608d2c3a9795f
SHA-256
76ab8496660eab79e88ce5f94f340201c923d5731706a3d788922c9c3bff2f1c
9c2e49857c00116c81c0efa0259517d137d087d91ab8d37eada3a35b7e674c3a
4cbfb4de70991422d73871fc013f03329febe0e3fee1482c012b4ce67115ecc8
SHA1
f9b5dc130939fc20ec0abbcbae8f70123108fd10
5cad857e99236d8d0b0e2012fda873e436e786dc
16a2fadf03cc16b4735670938a7a0ae4c1d39d1e
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.