Behavioral task
behavioral1
Sample
3bf2c814ade54ce77c12ad089043709d78281e6b0433fbbd8010663e01a976b8.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3bf2c814ade54ce77c12ad089043709d78281e6b0433fbbd8010663e01a976b8.exe
Resource
win10v2004-20240802-en
General
-
Target
f0794d5310c299d4ac102beda80eaea9.zip
-
Size
7KB
-
MD5
231ea7e08e4a072a70ea9888dbd3b9c2
-
SHA1
60eae757c14fca0157b42990214b9bc24144d28a
-
SHA256
0c1334fbfe043c119c0ccc2715fbbd019c9a27813bda7b77ad2cb26bc245ccff
-
SHA512
27bdf0659579940291c1b1e6b29dd907fdcd443ab362fa59b93779ddec53423b149f371e217d1c975ee03f0e1e5b36b0350901f51b7f6fd811d40443ba48fde4
-
SSDEEP
192:enME2bOboC0vaO0yMHIBjlS9sVtHCSSGpN1YSiyN++1xOcrrki8iD:eMEG9C+aO0VHIyv0YtaUcn8iD
Malware Config
Extracted
revengerat
LimeRevenge
287-bc82-711e6d8a5a90
Signatures
-
Revengerat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/3bf2c814ade54ce77c12ad089043709d78281e6b0433fbbd8010663e01a976b8
Files
-
f0794d5310c299d4ac102beda80eaea9.zip.zip
Password: infected
-
3bf2c814ade54ce77c12ad089043709d78281e6b0433fbbd8010663e01a976b8.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ