Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 02:32
Static task
static1
Behavioral task
behavioral1
Sample
9b010a715df630f7ef61d944b3aef0c412f6f90604e61776b7403ec8ab9a8b45.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9b010a715df630f7ef61d944b3aef0c412f6f90604e61776b7403ec8ab9a8b45.exe
Resource
win10v2004-20220414-en
General
-
Target
9b010a715df630f7ef61d944b3aef0c412f6f90604e61776b7403ec8ab9a8b45.exe
-
Size
58KB
-
MD5
64c8cebab58b85ad9a395b2e435c9f3f
-
SHA1
f11370500d686cf69a34e2848428a8ec0f24d69d
-
SHA256
9b010a715df630f7ef61d944b3aef0c412f6f90604e61776b7403ec8ab9a8b45
-
SHA512
360d41015dce521705efb1514ae28e6402dda2b3ec1125942ce46bcc638304ced77a23c3ec8777bf84511d47c47c76a40d98a5cdda6525c872711b0f36fd59b3
Malware Config
Extracted
revengerat
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1980-56-0x00000000002F0000-0x00000000002F8000-memory.dmp revengerat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9b010a715df630f7ef61d944b3aef0c412f6f90604e61776b7403ec8ab9a8b45.exedescription pid process Token: SeDebugPrivilege 1980 9b010a715df630f7ef61d944b3aef0c412f6f90604e61776b7403ec8ab9a8b45.exe