General
-
Target
cb0c2b0db1de4845fafdd4b8e2a1ef398bdee18377216d1d0f447106bea4ef6a
-
Size
1.1MB
-
Sample
201111-6mcs1bb2la
-
MD5
588328b4886f345e3b63d5eac584a7b9
-
SHA1
fd67734dd216f04779a41a3661f9ddfee1f3b588
-
SHA256
cb0c2b0db1de4845fafdd4b8e2a1ef398bdee18377216d1d0f447106bea4ef6a
-
SHA512
7fe047092033ae7556e532bac4b54932578680feb168ab11842c4614842f1d1cce134b3e78727f8ef152c469fec22f2b26a50f53bfb314c57064288ec50a1b77
Static task
static1
Behavioral task
behavioral1
Sample
cb0c2b0db1de4845fafdd4b8e2a1ef398bdee18377216d1d0f447106bea4ef6a.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
cb0c2b0db1de4845fafdd4b8e2a1ef398bdee18377216d1d0f447106bea4ef6a.exe
Resource
win10v20201028
Malware Config
Extracted
revengerat
Guest
178.17.174.71:3310
RV_MUTEX-HxdYuaWVCGnhp
Targets
-
-
Target
cb0c2b0db1de4845fafdd4b8e2a1ef398bdee18377216d1d0f447106bea4ef6a
-
Size
1.1MB
-
MD5
588328b4886f345e3b63d5eac584a7b9
-
SHA1
fd67734dd216f04779a41a3661f9ddfee1f3b588
-
SHA256
cb0c2b0db1de4845fafdd4b8e2a1ef398bdee18377216d1d0f447106bea4ef6a
-
SHA512
7fe047092033ae7556e532bac4b54932578680feb168ab11842c4614842f1d1cce134b3e78727f8ef152c469fec22f2b26a50f53bfb314c57064288ec50a1b77
Score10/10-
RevengeRat Executable
-
Drops startup file
-
Suspicious use of SetThreadContext
-