General
-
Target
292cf982ba7c343cf1d726e0dfc04ff2
-
Size
1KB
-
Sample
231231-fnk7lahagl
-
MD5
292cf982ba7c343cf1d726e0dfc04ff2
-
SHA1
bc862bcc556424af6ce4d431da9e8a37749979f6
-
SHA256
695874c34915a2fdeff1780c63610dcfaecd6ae1ec96566e709496dfbd502240
-
SHA512
cc7a5de149736fd6bb11aad15a3a0391d6f3a4d07c48af326b5709642ee1ae6cff56e47180f7dc436fce13a141329ac9974ed562a62ffbbbf9b4fd7d382579cd
Static task
static1
Behavioral task
behavioral1
Sample
292cf982ba7c343cf1d726e0dfc04ff2.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
292cf982ba7c343cf1d726e0dfc04ff2.vbs
Resource
win10v2004-20231222-en
Malware Config
Extracted
revengerat
Guest
asscoming.duckdns.org:333
RV_MUTEX
Targets
-
-
Target
292cf982ba7c343cf1d726e0dfc04ff2
-
Size
1KB
-
MD5
292cf982ba7c343cf1d726e0dfc04ff2
-
SHA1
bc862bcc556424af6ce4d431da9e8a37749979f6
-
SHA256
695874c34915a2fdeff1780c63610dcfaecd6ae1ec96566e709496dfbd502240
-
SHA512
cc7a5de149736fd6bb11aad15a3a0391d6f3a4d07c48af326b5709642ee1ae6cff56e47180f7dc436fce13a141329ac9974ed562a62ffbbbf9b4fd7d382579cd
Score10/10-
RevengeRat Executable
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-