General
-
Target
cool.exe
-
Size
23KB
-
Sample
240913-x4nq4avcme
-
MD5
4b61aedaee4e3be743dbebea96f91441
-
SHA1
448faae75b84b7dd9d66f1386f178935523a429c
-
SHA256
d650607092d56dd7df0b19c17e0ee5fb331af3aa03cd961e70e0a34310504a62
-
SHA512
1015e7d9476a8089d4ac5dcc0f2dc97154cbe7f05ae8990548fb23b4577cf863e11a6545df04dcca4995c7e74a6f916d55e442c8678885c1c742686688b65deb
-
SSDEEP
384:mb+cnNzGglTgMnmrBcNFEhmisbYpGy4AVFCzYcHe+Z:mbtucjs+AV8zYcHe+Z
Behavioral task
behavioral1
Sample
cool.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cool.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
revengerat
Guest
127.0.0.1:1604
RV_MUTEX
Targets
-
-
Target
cool.exe
-
Size
23KB
-
MD5
4b61aedaee4e3be743dbebea96f91441
-
SHA1
448faae75b84b7dd9d66f1386f178935523a429c
-
SHA256
d650607092d56dd7df0b19c17e0ee5fb331af3aa03cd961e70e0a34310504a62
-
SHA512
1015e7d9476a8089d4ac5dcc0f2dc97154cbe7f05ae8990548fb23b4577cf863e11a6545df04dcca4995c7e74a6f916d55e442c8678885c1c742686688b65deb
-
SSDEEP
384:mb+cnNzGglTgMnmrBcNFEhmisbYpGy4AVFCzYcHe+Z:mbtucjs+AV8zYcHe+Z
Score10/10-
RevengeRat Executable
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-