General
-
Target
abaadb13e68f75e822c4d9468506cdeeb747eb88c7fec0f68b8b5b6d975b91ef
-
Size
873KB
-
Sample
220525-b41vrsehc4
-
MD5
36d7527dfeb6545fa18c41686ace0388
-
SHA1
d5da31212c94e127b21ba0a80e32dc84eb86d0e8
-
SHA256
abaadb13e68f75e822c4d9468506cdeeb747eb88c7fec0f68b8b5b6d975b91ef
-
SHA512
c06dde1ebb168d0e7a997d57cd46ae13be2ceec1a60bb09869809bd498b6a42a4101d7a06fbcafe90cddbd16862d1ad73c4405e7b2b9f171639584bb02ed2a56
Static task
static1
Behavioral task
behavioral1
Sample
abaadb13e68f75e822c4d9468506cdeeb747eb88c7fec0f68b8b5b6d975b91ef.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
abaadb13e68f75e822c4d9468506cdeeb747eb88c7fec0f68b8b5b6d975b91ef.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
revengerat
Guest
ournewcompany2.hopto.org:333
RV_MUTEX
Targets
-
-
Target
abaadb13e68f75e822c4d9468506cdeeb747eb88c7fec0f68b8b5b6d975b91ef
-
Size
873KB
-
MD5
36d7527dfeb6545fa18c41686ace0388
-
SHA1
d5da31212c94e127b21ba0a80e32dc84eb86d0e8
-
SHA256
abaadb13e68f75e822c4d9468506cdeeb747eb88c7fec0f68b8b5b6d975b91ef
-
SHA512
c06dde1ebb168d0e7a997d57cd46ae13be2ceec1a60bb09869809bd498b6a42a4101d7a06fbcafe90cddbd16862d1ad73c4405e7b2b9f171639584bb02ed2a56
Score10/10-
RevengeRat Executable
-
Drops startup file
-
Suspicious use of SetThreadContext
-