General
-
Target
2bb44181c7547a69b7ea6a4d7c13baba0e623dd5049c055ad3902b3e04c68f62
-
Size
16KB
-
Sample
220201-jlylpabec3
-
MD5
7ca02266bc538848720225ead84aba2a
-
SHA1
940c25a5af2413893282fc7464abe77f7abf5707
-
SHA256
2bb44181c7547a69b7ea6a4d7c13baba0e623dd5049c055ad3902b3e04c68f62
-
SHA512
4c101bf3b24a4018ab407aa8a37a8aa3a657727128657ea6d0bd1257a5096737b8c7010303321c68f1805a99d748c8b193fdcb2452b887c55881950153c1dc35
Static task
static1
Behavioral task
behavioral1
Sample
2bb44181c7547a69b7ea6a4d7c13baba0e623dd5049c055ad3902b3e04c68f62.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2bb44181c7547a69b7ea6a4d7c13baba0e623dd5049c055ad3902b3e04c68f62.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
revengerat
Guest
brwa0772.ddns.net:1177
RV_MUTEX
Targets
-
-
Target
2bb44181c7547a69b7ea6a4d7c13baba0e623dd5049c055ad3902b3e04c68f62
-
Size
16KB
-
MD5
7ca02266bc538848720225ead84aba2a
-
SHA1
940c25a5af2413893282fc7464abe77f7abf5707
-
SHA256
2bb44181c7547a69b7ea6a4d7c13baba0e623dd5049c055ad3902b3e04c68f62
-
SHA512
4c101bf3b24a4018ab407aa8a37a8aa3a657727128657ea6d0bd1257a5096737b8c7010303321c68f1805a99d748c8b193fdcb2452b887c55881950153c1dc35
Score8/10-
Sets service image path in registry
-