Analysis
-
max time kernel
137s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 13:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
explorer.exe
Resource
win7-20230831-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
explorer.exe
Resource
win10v2004-20230915-en
11 signatures
150 seconds
General
-
Target
explorer.exe
-
Size
133KB
-
MD5
b5aa442ab77d82842f563148fb7ea482
-
SHA1
867691f6f5dc3a30c53c5ac6623ab0c081db5053
-
SHA256
33f2e43c3d209ede2937d61e006f64eb8ed55cf6a3184f03054940bf7926fd3d
-
SHA512
b6a3066b9b812f122ec85cbcb9cd6860d32915a798cd919346a9c5df5fa1b447947c986a6b721f6b65d141e20ed06e877333812669d74c2f15325561880a947f
-
SSDEEP
3072:LtoX9jlNwmIEcoablKu8WseS7xC3EVbH0hLNM:L49j/dIEWblKpd3BUT
Score
10/10
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/memory/1956-4-0x0000000000420000-0x000000000042C000-memory.dmp revengerat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Explorer = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\explorer.exe" explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1956 explorer.exe