General
-
Target
0d398359c66e65c7c23e23f98732593a6a7a1eb91947249b639f3443fd65b36e
-
Size
104KB
-
Sample
220529-z8xwnseeak
-
MD5
44f3a040393c88dcb5277ee7fce82211
-
SHA1
c2f12d9514a33a9d8debf6c3bb6fb2d80ce62ad0
-
SHA256
0d398359c66e65c7c23e23f98732593a6a7a1eb91947249b639f3443fd65b36e
-
SHA512
6673a96115f3d1f311efb3102d5679bd1797298e389e076dc46898c84d4d665380cf77cb3c58a6ab0b8378d2888cfc73cd49836ea278d597878a34ffbfb15da7
Static task
static1
Behavioral task
behavioral1
Sample
0d398359c66e65c7c23e23f98732593a6a7a1eb91947249b639f3443fd65b36e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0d398359c66e65c7c23e23f98732593a6a7a1eb91947249b639f3443fd65b36e.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
revengerat
system
myrevenge.ddns.net:1337
RV_MUTEX-YFYEKgHDMFLRMS
Targets
-
-
Target
0d398359c66e65c7c23e23f98732593a6a7a1eb91947249b639f3443fd65b36e
-
Size
104KB
-
MD5
44f3a040393c88dcb5277ee7fce82211
-
SHA1
c2f12d9514a33a9d8debf6c3bb6fb2d80ce62ad0
-
SHA256
0d398359c66e65c7c23e23f98732593a6a7a1eb91947249b639f3443fd65b36e
-
SHA512
6673a96115f3d1f311efb3102d5679bd1797298e389e076dc46898c84d4d665380cf77cb3c58a6ab0b8378d2888cfc73cd49836ea278d597878a34ffbfb15da7
Score10/10-
RevengeRat Executable
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Drops file in System32 directory
-