General
-
Target
f08b4bf9d69bb3d0d8331da658d55642c03537ce985075b9c95ba6dfc69587fe
-
Size
17KB
-
Sample
220205-j3fgfahdd5
-
MD5
0282e3f3c85d9dc212922206b57c075f
-
SHA1
a91370bc6c253102f091489f65580f6318e2f3ca
-
SHA256
f08b4bf9d69bb3d0d8331da658d55642c03537ce985075b9c95ba6dfc69587fe
-
SHA512
bdd5021930bca1cf2f68f01593ee223815fa49d2a7c2dfc530fa7a4098eb74e12195beea8c743a5e8dd326ce1af5198268a4ae8721257c747feebb67d8e0d6e5
Static task
static1
Behavioral task
behavioral1
Sample
f08b4bf9d69bb3d0d8331da658d55642c03537ce985075b9c95ba6dfc69587fe.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f08b4bf9d69bb3d0d8331da658d55642c03537ce985075b9c95ba6dfc69587fe.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
revengerat
Guest
windowuser.ddns.net:1117
RV_MUTEX
Targets
-
-
Target
f08b4bf9d69bb3d0d8331da658d55642c03537ce985075b9c95ba6dfc69587fe
-
Size
17KB
-
MD5
0282e3f3c85d9dc212922206b57c075f
-
SHA1
a91370bc6c253102f091489f65580f6318e2f3ca
-
SHA256
f08b4bf9d69bb3d0d8331da658d55642c03537ce985075b9c95ba6dfc69587fe
-
SHA512
bdd5021930bca1cf2f68f01593ee223815fa49d2a7c2dfc530fa7a4098eb74e12195beea8c743a5e8dd326ce1af5198268a4ae8721257c747feebb67d8e0d6e5
Score8/10-
Sets service image path in registry
-
Drops startup file
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-