Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
27-02-2022 02:55
Static task
static1
Behavioral task
behavioral1
Sample
b759243e0b1b03d3c7f3cf4bdb3f92f81432cb06192e25cb92127815f89ab48c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b759243e0b1b03d3c7f3cf4bdb3f92f81432cb06192e25cb92127815f89ab48c.exe
Resource
win10v2004-en-20220112
General
-
Target
b759243e0b1b03d3c7f3cf4bdb3f92f81432cb06192e25cb92127815f89ab48c.exe
-
Size
274KB
-
MD5
e9eff0054dcde9e3588ca70c2a2f4258
-
SHA1
0bf96aa293e7b8618a0df2742f5336d394ee0afe
-
SHA256
b759243e0b1b03d3c7f3cf4bdb3f92f81432cb06192e25cb92127815f89ab48c
-
SHA512
4c8c8a3d414bf999bf0c73bcc820669df74b883c140f90ce856c154dea7910121731adde335c91f338d75cbae5ca9655444426e1dec3df401caaadccda359bf1
Malware Config
Extracted
revengerat
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule behavioral1/memory/968-56-0x0000000000310000-0x0000000000318000-memory.dmp revengerat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b759243e0b1b03d3c7f3cf4bdb3f92f81432cb06192e25cb92127815f89ab48c.exedescription pid process Token: SeDebugPrivilege 968 b759243e0b1b03d3c7f3cf4bdb3f92f81432cb06192e25cb92127815f89ab48c.exe