Analysis
-
max time kernel
151s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 20:26
Static task
static1
Behavioral task
behavioral1
Sample
38507211d1541b45f4aed046e1034ee39de3c735e867988d6685b94fe76b939b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
38507211d1541b45f4aed046e1034ee39de3c735e867988d6685b94fe76b939b.exe
Resource
win10v2004-20220414-en
General
-
Target
38507211d1541b45f4aed046e1034ee39de3c735e867988d6685b94fe76b939b.exe
-
Size
124KB
-
MD5
0f0fa88fbd9f56a6ee06e5ad8ca2a22a
-
SHA1
ac0ccde522befaaabbfeec316d1813bd0e4cb198
-
SHA256
38507211d1541b45f4aed046e1034ee39de3c735e867988d6685b94fe76b939b
-
SHA512
7a455166ff91aa92354654645ec5400e438cc753b3688d6b569c1d7e85298531c27318a6888e5c9c2910ec04dd1499f0ded0cab2d7bedf37cff480833cddddf5
Malware Config
Extracted
revengerat
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2040-55-0x00000000002E0000-0x00000000002E8000-memory.dmp revengerat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
38507211d1541b45f4aed046e1034ee39de3c735e867988d6685b94fe76b939b.exedescription pid process Token: SeDebugPrivilege 2040 38507211d1541b45f4aed046e1034ee39de3c735e867988d6685b94fe76b939b.exe