General
-
Target
9e70c5b4e6bbfaa1f7d410b0d79aae92c23a88ce32f7b6e651bfcfeece407bf7
-
Size
45KB
-
Sample
220219-kz463abbeq
-
MD5
3466fd80a243ae5b2e2581214b49d0be
-
SHA1
a68eb0b7f56bc5459502f83ffa55e6a783b78797
-
SHA256
9e70c5b4e6bbfaa1f7d410b0d79aae92c23a88ce32f7b6e651bfcfeece407bf7
-
SHA512
ca3bce0228d8ad34e90ed49207bbc3e4f906281167bf20f02e9f7aa0fe8054741578d0d98132e70417913ffc2caff4f5f710f76acd351981c6c5a4dac74ad720
Static task
static1
Behavioral task
behavioral1
Sample
9e70c5b4e6bbfaa1f7d410b0d79aae92c23a88ce32f7b6e651bfcfeece407bf7.ps1
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
9e70c5b4e6bbfaa1f7d410b0d79aae92c23a88ce32f7b6e651bfcfeece407bf7.ps1
Resource
win10v2004-en-20220113
Malware Config
Extracted
revengerat
Client
kimjoy.ddns.net:2021
RXQLV8XYTDNHNSA
Targets
-
-
Target
9e70c5b4e6bbfaa1f7d410b0d79aae92c23a88ce32f7b6e651bfcfeece407bf7
-
Size
45KB
-
MD5
3466fd80a243ae5b2e2581214b49d0be
-
SHA1
a68eb0b7f56bc5459502f83ffa55e6a783b78797
-
SHA256
9e70c5b4e6bbfaa1f7d410b0d79aae92c23a88ce32f7b6e651bfcfeece407bf7
-
SHA512
ca3bce0228d8ad34e90ed49207bbc3e4f906281167bf20f02e9f7aa0fe8054741578d0d98132e70417913ffc2caff4f5f710f76acd351981c6c5a4dac74ad720
Score10/10-
Suspicious use of SetThreadContext
-