General
-
Target
sample.exe
-
Size
6.3MB
-
Sample
230324-zyvzbshd59
-
MD5
c5312ef3c2394517918f27aeec8b97b3
-
SHA1
9f49b322a92a3ce3914aaf30f6c8163b987ec678
-
SHA256
3cf32b77fcb1783f3c5dbbf82bf6630618691f3d51dadd015a9fd43e92d7bc6d
-
SHA512
13e6b5461d165d217a48f63052ada527b16bb9be4e1e68adf53ba2d8b895ca292e8301a86ca0d091c1449242375d069a19f5adc81bb4509d903a1a74c589fd27
-
SSDEEP
196608:hgcWmJcIhc9dDxt7xhw5ZV983405QYtsTEB08T8HehLvkU:7CLdltlhaZHwVdfB08TOeh9
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
revengerat
System Service
anonymous83.ddns.net:4040
RV_MUTEX-nawrHJfWfhaRC
Targets
-
-
Target
sample.exe
-
Size
6.3MB
-
MD5
c5312ef3c2394517918f27aeec8b97b3
-
SHA1
9f49b322a92a3ce3914aaf30f6c8163b987ec678
-
SHA256
3cf32b77fcb1783f3c5dbbf82bf6630618691f3d51dadd015a9fd43e92d7bc6d
-
SHA512
13e6b5461d165d217a48f63052ada527b16bb9be4e1e68adf53ba2d8b895ca292e8301a86ca0d091c1449242375d069a19f5adc81bb4509d903a1a74c589fd27
-
SSDEEP
196608:hgcWmJcIhc9dDxt7xhw5ZV983405QYtsTEB08T8HehLvkU:7CLdltlhaZHwVdfB08TOeh9
-
Looks for VirtualBox Guest Additions in registry
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
RevengeRat Executable
-
Drops file in Drivers directory
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-