General
-
Target
721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61
-
Size
42KB
-
Sample
220219-ky2dsabbdr
-
MD5
2bd198d265d67c9f4021eca5bb341900
-
SHA1
e3559a0d69e988877ce69d66b69cb41619521272
-
SHA256
721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61
-
SHA512
fa00e4b59b41ccbe865d342815001262323db96f99ebd30b1a5728111f9959c2e2775a5f279652649505ad23afe7a5551a705c650b985829cd2690f92f50e8f4
Static task
static1
Behavioral task
behavioral1
Sample
721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61.ps1
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61.ps1
Resource
win10v2004-en-20220112
Malware Config
Extracted
revengerat
Client
kimjoy.ddns.net:2021
RXQLV8XYTDNHNSA
Targets
-
-
Target
721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61
-
Size
42KB
-
MD5
2bd198d265d67c9f4021eca5bb341900
-
SHA1
e3559a0d69e988877ce69d66b69cb41619521272
-
SHA256
721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61
-
SHA512
fa00e4b59b41ccbe865d342815001262323db96f99ebd30b1a5728111f9959c2e2775a5f279652649505ad23afe7a5551a705c650b985829cd2690f92f50e8f4
Score10/10-
Suspicious use of SetThreadContext
-