General
-
Target
renekton2GPJ..exe
-
Size
20KB
-
Sample
201120-9e772f792e
-
MD5
126bd8afd4b7c1ad5676e489e7463511
-
SHA1
f08b87f487d7ea75a97ac10a7d995b5e83187f72
-
SHA256
ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454
-
SHA512
71a541dcf831a8d0b684356e777beb95dfe838d71c781b92c7128691cd5f9418c30340511891239500e60f2feeed3bb383adc0b212b97a37b40cff9af814bf06
Static task
static1
Behavioral task
behavioral1
Sample
renekton2GPJ..exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
renekton2GPJ..exe
Resource
win10v20201028
Malware Config
Extracted
revengerat
Client
127.0.0.1:333
127.0.0.1:37337
RV_MUTEX
Targets
-
-
Target
renekton2GPJ..exe
-
Size
20KB
-
MD5
126bd8afd4b7c1ad5676e489e7463511
-
SHA1
f08b87f487d7ea75a97ac10a7d995b5e83187f72
-
SHA256
ca58619fd5de06d3b93040f7c7436887d73bfd11f5d8abc6abaa07fb35fbc454
-
SHA512
71a541dcf831a8d0b684356e777beb95dfe838d71c781b92c7128691cd5f9418c30340511891239500e60f2feeed3bb383adc0b212b97a37b40cff9af814bf06
Score10/10-
RevengeRat Executable
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-