General
-
Target
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118
-
Size
819KB
-
Sample
220707-3v4nvahbfr
-
MD5
5b9dd49ffe63a9cc638f28383cacac8f
-
SHA1
6ea781eb54e023b9dc06599be6349cb7c7eb8a37
-
SHA256
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118
-
SHA512
abdb1b0f3b18c8a85b5b3bd7dced382408cf0f37aa47dfc622546b793e17f5629f475666c399e0eafbc16c94368b1a727e6bdbaf104f00df2b9e04910662a36f
Static task
static1
Behavioral task
behavioral1
Sample
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
revengerat
BABAYAGA
condor777.chickenkiller.com:1604
EZlNApdygPhSv
Targets
-
-
Target
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118
-
Size
819KB
-
MD5
5b9dd49ffe63a9cc638f28383cacac8f
-
SHA1
6ea781eb54e023b9dc06599be6349cb7c7eb8a37
-
SHA256
4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118
-
SHA512
abdb1b0f3b18c8a85b5b3bd7dced382408cf0f37aa47dfc622546b793e17f5629f475666c399e0eafbc16c94368b1a727e6bdbaf104f00df2b9e04910662a36f
Score10/10-
RevengeRat Executable
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-