General
-
Target
f0a994ecc851b3456709d4e47191749b8e4c54d0d5f2a638b9972eadc9b200ef
-
Size
904KB
-
Sample
240710-hvwm1stcnm
-
MD5
c66671bbbde4525620e82f1ac1b2830d
-
SHA1
d67703f1ae2ce0cc67401d589ca758af7909b517
-
SHA256
f0a994ecc851b3456709d4e47191749b8e4c54d0d5f2a638b9972eadc9b200ef
-
SHA512
13ecfd3b2384e5a8f31e3f7a493a0cd20a256c40892d44ff6a4f5869989f71923892618fd331eb3f01c97f3225229a08c99af358725c9b166d64f0738e6b8c56
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5y:gh+ZkldoPK8YaKGy
Static task
static1
Behavioral task
behavioral1
Sample
f0a994ecc851b3456709d4e47191749b8e4c54d0d5f2a638b9972eadc9b200ef.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f0a994ecc851b3456709d4e47191749b8e4c54d0d5f2a638b9972eadc9b200ef.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
f0a994ecc851b3456709d4e47191749b8e4c54d0d5f2a638b9972eadc9b200ef
-
Size
904KB
-
MD5
c66671bbbde4525620e82f1ac1b2830d
-
SHA1
d67703f1ae2ce0cc67401d589ca758af7909b517
-
SHA256
f0a994ecc851b3456709d4e47191749b8e4c54d0d5f2a638b9972eadc9b200ef
-
SHA512
13ecfd3b2384e5a8f31e3f7a493a0cd20a256c40892d44ff6a4f5869989f71923892618fd331eb3f01c97f3225229a08c99af358725c9b166d64f0738e6b8c56
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5y:gh+ZkldoPK8YaKGy
Score10/10-
Drops startup file
-
Suspicious use of SetThreadContext
-