Rhadamanthys Stealer Module Launch Via Rundll32.EXE
Detects the use of Rundll32 to launch an NSIS module that serves as the main stealer capability of Rhadamanthys infostealer, as observed in reports and samples in early 2023
Sigma rule (View on GitHub)
 1title: Rhadamanthys Stealer Module Launch Via Rundll32.EXE
 2id: 5cdbc2e8-86dd-43df-9a1a-200d4745fba5
 3status: test
 4description: Detects the use of Rundll32 to launch an NSIS module that serves as the main stealer capability of Rhadamanthys infostealer, as observed in reports and samples in early 2023
 5references:
 6    - https://elis531989.medium.com/dancing-with-shellcodes-analyzing-rhadamanthys-stealer-3c4986966a88
 7    - https://blog.cyble.com/2023/01/12/rhadamanthys-new-stealer-spreading-through-google-ads/
 8    - https://www.joesandbox.com/analysis/790122/0/html
 9    - https://twitter.com/anfam17/status/1607477672057208835
10author: TropChaud
11date: 2023-01-26
12modified: 2023-02-05
13tags:
14    - attack.defense-evasion
15    - attack.t1218.011
16    - detection.emerging-threats
17logsource:
18    category: process_creation
19    product: windows
20detection:
21    selection_rundll32:
22        - OriginalFileName: 'RUNDLL32.EXE'
23        - Image|endswith: '\rundll32.exe'
24    selection_dll:
25        CommandLine|contains: 'nsis_uns'
26    selection_export_function:
27        CommandLine|contains: 'PrintUIEntry'
28    condition: all of selection_*
29falsepositives:
30    - Unknown
31level: medium
References
Related rules
- APT29 2018 Phishing Campaign CommandLine Indicators
 - APT29 2018 Phishing Campaign File Indicators
 - Equation Group DLL_U Export Function Load
 - EvilNum APT Golden Chickens Deployment Via OCX Files
 - Fireball Archer Install