General
-
Target
Client4PM..exe
-
Size
467KB
-
Sample
240913-1ke7dszgqk
-
MD5
b46e938e455f07908b277bacaf40c1b8
-
SHA1
10b0d817957340cf35df3b20a37a14ec12ccf34a
-
SHA256
a621f7d758f70c986ebc40d2e9ad89187a4659f1e26ae33af6b19557c0074038
-
SHA512
965da90a55b382b78e385e20f1714541ac64b2c9e62605cf0b14513d21a5e181b6def0e9df04f74cb55759b070a399c5593142476da15358cdf022d1b00eb8c7
-
SSDEEP
3072:md3MwOibhTsNElLD5CbwDa9SY4AwZB7uy6W:md3BhTsNElLDzD+7PwTam
Behavioral task
behavioral1
Sample
Client4PM..exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Client4PM..exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
revengerat
Guest
127.0.0.1:333
RV_MUTEX
Targets
-
-
Target
Client4PM..exe
-
Size
467KB
-
MD5
b46e938e455f07908b277bacaf40c1b8
-
SHA1
10b0d817957340cf35df3b20a37a14ec12ccf34a
-
SHA256
a621f7d758f70c986ebc40d2e9ad89187a4659f1e26ae33af6b19557c0074038
-
SHA512
965da90a55b382b78e385e20f1714541ac64b2c9e62605cf0b14513d21a5e181b6def0e9df04f74cb55759b070a399c5593142476da15358cdf022d1b00eb8c7
-
SSDEEP
3072:md3MwOibhTsNElLD5CbwDa9SY4AwZB7uy6W:md3BhTsNElLDzD+7PwTam
Score10/10-
RevengeRat Executable
-
Uses the VBS compiler for execution
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-