General
-
Target
b2144af6922d925a99bdb5e2264b40af2d310c556444fa61ee190ced786ff81b
-
Size
26KB
-
Sample
220201-e3fd8ahcc5
-
MD5
ab0a239a67498b1fe875cac61e1cc881
-
SHA1
259e3a7a5350d79d7f18677aeb5dad0df3c1c4e6
-
SHA256
b2144af6922d925a99bdb5e2264b40af2d310c556444fa61ee190ced786ff81b
-
SHA512
657d23e85e010ed6bd71e46fdf3c56e16ac2946e6a0e341ace1440c82af0c4fb85630a5cfcd1044e80138ebd815be6bd5bf714d230d1d976e68839800f26f6b9
Static task
static1
Behavioral task
behavioral1
Sample
b2144af6922d925a99bdb5e2264b40af2d310c556444fa61ee190ced786ff81b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b2144af6922d925a99bdb5e2264b40af2d310c556444fa61ee190ced786ff81b.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
revengerat
OwO
steroidigo.ddns.net:1605
RV_MUTEX-HrLwVrReSbcn
Targets
-
-
Target
b2144af6922d925a99bdb5e2264b40af2d310c556444fa61ee190ced786ff81b
-
Size
26KB
-
MD5
ab0a239a67498b1fe875cac61e1cc881
-
SHA1
259e3a7a5350d79d7f18677aeb5dad0df3c1c4e6
-
SHA256
b2144af6922d925a99bdb5e2264b40af2d310c556444fa61ee190ced786ff81b
-
SHA512
657d23e85e010ed6bd71e46fdf3c56e16ac2946e6a0e341ace1440c82af0c4fb85630a5cfcd1044e80138ebd815be6bd5bf714d230d1d976e68839800f26f6b9
Score8/10-
Sets service image path in registry
-
Adds Run key to start application
-