General
-
Target
WWL.exe
-
Size
142KB
-
Sample
230611-klhe5sgh23
-
MD5
ff621b3ec028ff34e6dd40649434e246
-
SHA1
2bf21078ee8f88b70291c41f7e41ab03fad0a27d
-
SHA256
40254755e4c6325be6f0678fe1f3daa23cbf639714142449740a0dc5dc4a1790
-
SHA512
2bc1dcf4bb3cc887f8bd9188df7eb01eebe1516c7120a6b355af2a85790dcd3d9ffcd9cc529de5e5613178efe264dcb3c99730b1adb6f1d84b9e4afc0f4bb368
-
SSDEEP
3072:uSDDjXTV/uzgjk28xguWthZfeZtb6PRX:uSXjjox28jEfeP8
Behavioral task
behavioral1
Sample
WWL.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
WWL.exe
-
Size
142KB
-
MD5
ff621b3ec028ff34e6dd40649434e246
-
SHA1
2bf21078ee8f88b70291c41f7e41ab03fad0a27d
-
SHA256
40254755e4c6325be6f0678fe1f3daa23cbf639714142449740a0dc5dc4a1790
-
SHA512
2bc1dcf4bb3cc887f8bd9188df7eb01eebe1516c7120a6b355af2a85790dcd3d9ffcd9cc529de5e5613178efe264dcb3c99730b1adb6f1d84b9e4afc0f4bb368
-
SSDEEP
3072:uSDDjXTV/uzgjk28xguWthZfeZtb6PRX:uSXjjox28jEfeP8
Score10/10-
RevengeRat Executable
-
Drops startup file
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-