Malware Analysis Report

2024-10-23 21:31

Sample ID 240804-qz4s7awfmk
Target 581d49be492287faee8d97ef0ae861850a7f2ebefd58f83dda39c0bcdcf59b1f
SHA256 581d49be492287faee8d97ef0ae861850a7f2ebefd58f83dda39c0bcdcf59b1f
Tags
stealer revengerat discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

581d49be492287faee8d97ef0ae861850a7f2ebefd58f83dda39c0bcdcf59b1f

Threat Level: Known bad

The file 581d49be492287faee8d97ef0ae861850a7f2ebefd58f83dda39c0bcdcf59b1f was found to be: Known bad.

Malicious Activity Summary

stealer revengerat discovery

RevengeRat Executable

Revengerat family

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-04 13:42

Signatures

RevengeRat Executable

stealer
Description Indicator Process Target
N/A N/A N/A N/A

Revengerat family

revengerat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-04 13:42

Reported

2024-08-04 13:45

Platform

win7-20240705-en

Max time kernel

118s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe

"C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe"

Network

N/A

Files

memory/2632-0-0x000000007433E000-0x000000007433F000-memory.dmp

memory/2632-1-0x0000000000930000-0x000000000099E000-memory.dmp

memory/2632-2-0x0000000074330000-0x0000000074A1E000-memory.dmp

memory/2632-4-0x0000000074330000-0x0000000074A1E000-memory.dmp

memory/2632-3-0x0000000000630000-0x000000000064C000-memory.dmp

memory/2632-5-0x0000000074330000-0x0000000074A1E000-memory.dmp

memory/2632-7-0x0000000074330000-0x0000000074A1E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-04 13:42

Reported

2024-08-04 13:45

Platform

win10v2004-20240802-en

Max time kernel

93s

Max time network

95s

Command Line

"C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe

"C:\Users\Admin\AppData\Local\Temp\XV2SSEdit.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp

Files

memory/4116-0-0x000000007499E000-0x000000007499F000-memory.dmp

memory/4116-1-0x00000000006C0000-0x000000000072E000-memory.dmp

memory/4116-2-0x0000000005730000-0x0000000005CD4000-memory.dmp

memory/4116-3-0x0000000005180000-0x0000000005212000-memory.dmp

memory/4116-5-0x0000000074990000-0x0000000075140000-memory.dmp

memory/4116-4-0x0000000005140000-0x000000000514A000-memory.dmp

memory/4116-6-0x0000000074990000-0x0000000075140000-memory.dmp

memory/4116-7-0x00000000082A0000-0x00000000082BC000-memory.dmp

memory/4116-9-0x000000007499E000-0x000000007499F000-memory.dmp

memory/4116-10-0x0000000074990000-0x0000000075140000-memory.dmp