General
-
Target
e6eda9918b257e317e921d294b903f9488929fe7ef2efc0955bd141d19e15855
-
Size
17KB
-
Sample
220201-dnjmnafgfl
-
MD5
64c4cdba4768bc1ad90f0061037d4328
-
SHA1
411b304ae5aac0e7fe27bd17b8c50f081bca3654
-
SHA256
e6eda9918b257e317e921d294b903f9488929fe7ef2efc0955bd141d19e15855
-
SHA512
591c8a5613c7888199adf80bce31141a77a0ce9cb260d96a5dd8d40dfd764ebaa9846fa9020cee19c2766685cbbf7d28c57007888076bb03c0dcaec83ad60f50
Static task
static1
Behavioral task
behavioral1
Sample
e6eda9918b257e317e921d294b903f9488929fe7ef2efc0955bd141d19e15855.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e6eda9918b257e317e921d294b903f9488929fe7ef2efc0955bd141d19e15855.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
revengerat
2SP Force DZ
imaneblueyesvpn.ddns.net:333
RV_MUTEX-jpnFwUnoWrUUg
Targets
-
-
Target
e6eda9918b257e317e921d294b903f9488929fe7ef2efc0955bd141d19e15855
-
Size
17KB
-
MD5
64c4cdba4768bc1ad90f0061037d4328
-
SHA1
411b304ae5aac0e7fe27bd17b8c50f081bca3654
-
SHA256
e6eda9918b257e317e921d294b903f9488929fe7ef2efc0955bd141d19e15855
-
SHA512
591c8a5613c7888199adf80bce31141a77a0ce9cb260d96a5dd8d40dfd764ebaa9846fa9020cee19c2766685cbbf7d28c57007888076bb03c0dcaec83ad60f50
Score10/10-
RevengeRat Executable
-
Executes dropped EXE
-
Sets service image path in registry
-
Drops startup file
-
Adds Run key to start application
-