Analysis
-
max time kernel
155s -
max time network
140s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 09:06
Static task
static1
Behavioral task
behavioral1
Sample
17a97f5698f2f19b4b43dc985193f734f8146c83d73daf853df9506f58b696b3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
17a97f5698f2f19b4b43dc985193f734f8146c83d73daf853df9506f58b696b3.exe
Resource
win10v2004-en-20220112
General
-
Target
17a97f5698f2f19b4b43dc985193f734f8146c83d73daf853df9506f58b696b3.exe
-
Size
15KB
-
MD5
ec2df96be392543fa974d090962640e6
-
SHA1
b11ebd1f1b9423dfcdf81bf7c3fe1275b1d2aed1
-
SHA256
17a97f5698f2f19b4b43dc985193f734f8146c83d73daf853df9506f58b696b3
-
SHA512
bc8ddc1a7d7c4d07532a54dd486a07b4238256452d666849c7c266c83a877367f36a2ba6ce51db6a936acb4747c92d7bc52aee8d8aed7c3de02ad814f98e6a5a
Malware Config
Extracted
revengerat
Client
kimjoy.ddns.net:6699
S1NTYL5X286LOEH
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.