General
-
Target
5dadcff70276a8aa347136f8df0bd2fbd3342470ba4ef38da696b4426b91b7c6
-
Size
1.1MB
-
Sample
220731-2nxraabec2
-
MD5
90db2df33725d3ee85ccc9f2c241e3c3
-
SHA1
7efae20c555d7b92255a90097f876183f9a0ac3b
-
SHA256
5dadcff70276a8aa347136f8df0bd2fbd3342470ba4ef38da696b4426b91b7c6
-
SHA512
8ff581a8b090ee451b5bcad3bf97535abffd92e56c85a48d93a2a356ede94f210c2516161d02a123c4a541fdf4920e77fb51aa2601efe81d4e6771ac1c918c74
Static task
static1
Behavioral task
behavioral1
Sample
5dadcff70276a8aa347136f8df0bd2fbd3342470ba4ef38da696b4426b91b7c6.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5dadcff70276a8aa347136f8df0bd2fbd3342470ba4ef38da696b4426b91b7c6.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
revengerat
Guest
127.0.0.1:333
RV_MUTEX
Targets
-
-
Target
5dadcff70276a8aa347136f8df0bd2fbd3342470ba4ef38da696b4426b91b7c6
-
Size
1.1MB
-
MD5
90db2df33725d3ee85ccc9f2c241e3c3
-
SHA1
7efae20c555d7b92255a90097f876183f9a0ac3b
-
SHA256
5dadcff70276a8aa347136f8df0bd2fbd3342470ba4ef38da696b4426b91b7c6
-
SHA512
8ff581a8b090ee451b5bcad3bf97535abffd92e56c85a48d93a2a356ede94f210c2516161d02a123c4a541fdf4920e77fb51aa2601efe81d4e6771ac1c918c74
Score10/10-
RevengeRat Executable
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-