General
-
Target
abd5d1622a3b5f9838b13a29b4694224775346063270d6e581042708cc5b0bc1
-
Size
952KB
-
Sample
240731-dtdzcsyand
-
MD5
3ff4c0b7bb348fe4f5ebcd7a43b0a55e
-
SHA1
33c402a7802599d60ef1c5a7767e4e35ed562e7d
-
SHA256
abd5d1622a3b5f9838b13a29b4694224775346063270d6e581042708cc5b0bc1
-
SHA512
7fa65a2cb3b00260d0a46d7323ffecfc7ef09bf4dc2a7cb631f57196175028b952b3f993f8ec8ad7283e1af81422a81e76c17fcf52b984482c3677bb7d32c46e
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5d:Rh+ZkldDPK8YaKjd
Static task
static1
Behavioral task
behavioral1
Sample
abd5d1622a3b5f9838b13a29b4694224775346063270d6e581042708cc5b0bc1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
abd5d1622a3b5f9838b13a29b4694224775346063270d6e581042708cc5b0bc1.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
abd5d1622a3b5f9838b13a29b4694224775346063270d6e581042708cc5b0bc1
-
Size
952KB
-
MD5
3ff4c0b7bb348fe4f5ebcd7a43b0a55e
-
SHA1
33c402a7802599d60ef1c5a7767e4e35ed562e7d
-
SHA256
abd5d1622a3b5f9838b13a29b4694224775346063270d6e581042708cc5b0bc1
-
SHA512
7fa65a2cb3b00260d0a46d7323ffecfc7ef09bf4dc2a7cb631f57196175028b952b3f993f8ec8ad7283e1af81422a81e76c17fcf52b984482c3677bb7d32c46e
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5d:Rh+ZkldDPK8YaKjd
Score10/10-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-