Rhadamanthys 0.9.x – Walk through the updates #1456
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Scope
Check Point Research analyzes Rhadamanthys 0.9.x (focus on 0.9.2) across its full execution chain: Stage 1 loader, Stage 2 core/package, and Stage 3 stealer. It documents format churn (XS1_B/XS2_B), config pipeline, anti-analysis, module packaging/fetching, C2 transport, injection, and newly added stealer/fingerprinting components. CPR provides updated analyst tools (XS converter, string deobfuscators, package unpacker) plus allowlists/blocklists for sandbox-detec...
🔧 Technical Details
Anti-unpacked execution prompt: Detect when the loader runs from an unpacked sample and interrupt execution with a blocking prompt using
MessageBoxW
(vs. raw-syscallNtRaiseHardError
). This deters repackaging and frustrates naive dynamic analysis.Custom-format churn (XS1_B/XS2_B): Break parsers by shifting header fields and changing DLL-name decoding while preserving behavior. Use a 1‑byte
imp_key
in checksum resolution and widen import fields to invalidate older tooling. Always convert XS→PE with updated converters before static work.Config decoding pipeline: Extract embedded Base64 (custom alphabet) → ChaCha20 decrypt (inline key/IV) → CBC XOR shuffle → LZO decompress to a struct holding flags, 16‑byte
mutex_seed
, and multiple C2 URLs. Marker changed to0xBEEF
in 0.9.2. Track flags0x10
/0x20
/0x40
for file deletion, staging, and mutex-handle inh...🤖 Agent Actions
I analyzed the blog content and repository, found the right place (Basic Forensic Methodology → Malware Analysis), and added a dedicated Rhadamanthys page with all the technical details that weren’t present yet. I also linked it from the malware analysis index.
Summary of changes implemented:
No duplication with existing content was found; the XS format changes, config pipeline, in-memory re-obfuscation, sandbox checks via UUIDv1/WMI, PNG Stage 3, and RC4 string scheme were not previously covered.
References added in the new page:
If you need any refinement of categorization or cross-linking to Windows techniques pages (injection/AV bypass), let me know, but the core DFIR/malware-analysis material is now captured and linked properly.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).