General
-
Target
0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8
-
Size
125KB
-
Sample
220329-xfrg3sdhfp
-
MD5
1672081c9a9a80b4f2f31e311958fa2c
-
SHA1
def154edfe4cb8465677ed3fd9fffe506a307caf
-
SHA256
0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8
-
SHA512
ca292e87ec1b297e0e9bf5f8f270e67a13e20b78c0784fc80da421ba039a89104fe7792bc771acd024f48381979688febeffe65cfbbd1e19b52df768b04a50ca
Static task
static1
Behavioral task
behavioral1
Sample
0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
revengerat
dec
technovez.duckdns.org:6904
RV_MUTEX-bCGPPiCCaKuSAtY
Targets
-
-
Target
0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8
-
Size
125KB
-
MD5
1672081c9a9a80b4f2f31e311958fa2c
-
SHA1
def154edfe4cb8465677ed3fd9fffe506a307caf
-
SHA256
0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8
-
SHA512
ca292e87ec1b297e0e9bf5f8f270e67a13e20b78c0784fc80da421ba039a89104fe7792bc771acd024f48381979688febeffe65cfbbd1e19b52df768b04a50ca
Score10/10-
RevengeRat Executable
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Uses the VBS compiler for execution
-