General
-
Target
setup_nt.exe
-
Size
78.3MB
-
Sample
240919-ayr51a1hmm
-
MD5
53d9920e0bc746101dda3d70e1b7b3d1
-
SHA1
a2c8ca9bdd1398cd0b08dd4824fb8714acf3c072
-
SHA256
a315a5023f879208dca5f5f5486c8bfc23ed13e18bac83cef13579a123532dce
-
SHA512
660951b3bcfde545d4eff4da63eeb0d4201a9167dd954cf1ce42eb351d15d3ff21baba914254c1096488e34b57999008c23588227b840d3979608faf07aaebc6
-
SSDEEP
1572864:/WIPn5UPrh+YnUaMRAMShUDuO69p2Xzixl3cgD5LJIqi9pV:Dn5UThvnHMRAjyDur9pcUoqYpV
Static task
static1
Behavioral task
behavioral1
Sample
setup_nt.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
setup_nt.exe
-
Size
78.3MB
-
MD5
53d9920e0bc746101dda3d70e1b7b3d1
-
SHA1
a2c8ca9bdd1398cd0b08dd4824fb8714acf3c072
-
SHA256
a315a5023f879208dca5f5f5486c8bfc23ed13e18bac83cef13579a123532dce
-
SHA512
660951b3bcfde545d4eff4da63eeb0d4201a9167dd954cf1ce42eb351d15d3ff21baba914254c1096488e34b57999008c23588227b840d3979608faf07aaebc6
-
SSDEEP
1572864:/WIPn5UPrh+YnUaMRAMShUDuO69p2Xzixl3cgD5LJIqi9pV:Dn5UThvnHMRAjyDur9pcUoqYpV
-
RevengeRat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-