Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 11:58
Behavioral task
behavioral1
Sample
win.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
win.exe
Resource
win10v2004-20240419-en
General
-
Target
win.exe
-
Size
21KB
-
MD5
bc8e22ec9436819dfb6a581c1b106ce6
-
SHA1
a7320722aed02d6671fe08c8b9951f1fd14b4b23
-
SHA256
3d579a26aaa523f141c22cf94f00dd27163fda2ecbb724c2962bdff4d5b2838f
-
SHA512
c59387c6cb2f44e10dccc1f882008bf18aaebfc7931a434a5892d6717d3b5fd65c9a5cf3ab30d6c2b31a5165c53d8dfa0f5991a2415a1566fd409d26f8a15b8c
-
SSDEEP
384:kLNzO2fP3ZiQqoZYddYtvihtYBlX7KeLTMfspTSms6Aj:yNFikZYdYvqtYCblt
Malware Config
Extracted
revengerat
LimeBuilder
chutiyahaitu.duckdns.org:8080
RV_MUTEX-FZMONFueOciq
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum win.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 win.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 win.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString win.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4332 win.exe