General
-
Target
6ba80c4c0298efdf3e6a1cc0813f5e471cd41b33940a64b7507ddf715912401e
-
Size
108KB
-
Sample
220201-gkhsqshfcj
-
MD5
2f70e8a5b8655e094a4fb445b5ba8c42
-
SHA1
9137dc636262db62e8990f58b0bc64a28f73e6af
-
SHA256
6ba80c4c0298efdf3e6a1cc0813f5e471cd41b33940a64b7507ddf715912401e
-
SHA512
3d355e315fe6ef148041284b1f2631a3703bc6019650721c1cea85898289725ef2cd772b80a6c5d671831ef083182cec0c3780313587d28d0fdbf3db0ef2eebe
Static task
static1
Behavioral task
behavioral1
Sample
6ba80c4c0298efdf3e6a1cc0813f5e471cd41b33940a64b7507ddf715912401e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6ba80c4c0298efdf3e6a1cc0813f5e471cd41b33940a64b7507ddf715912401e.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
revengerat
Guest
192.168.0.30:8800
RV_MUTEX-RNHuiGGjjtnxDp
Targets
-
-
Target
6ba80c4c0298efdf3e6a1cc0813f5e471cd41b33940a64b7507ddf715912401e
-
Size
108KB
-
MD5
2f70e8a5b8655e094a4fb445b5ba8c42
-
SHA1
9137dc636262db62e8990f58b0bc64a28f73e6af
-
SHA256
6ba80c4c0298efdf3e6a1cc0813f5e471cd41b33940a64b7507ddf715912401e
-
SHA512
3d355e315fe6ef148041284b1f2631a3703bc6019650721c1cea85898289725ef2cd772b80a6c5d671831ef083182cec0c3780313587d28d0fdbf3db0ef2eebe
Score10/10-
RevengeRat Executable
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Sets service image path in registry
-
Drops startup file
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-