General
-
Target
3ee9bb2a97d8c7c76420a9981dc9ac364b2a105c33abac60a0b0789f2d22fd21
-
Size
952KB
-
Sample
240925-zcwczawfnr
-
MD5
ceb7415cfaf5ab864ef96492ad44adf8
-
SHA1
57ccb5c4e283232a8811b926f9399ef9d512481a
-
SHA256
3ee9bb2a97d8c7c76420a9981dc9ac364b2a105c33abac60a0b0789f2d22fd21
-
SHA512
9cd9379026c52e80ef71d84d6c4d27b078fbff2eb07f88e9c11980b7399325aec22535d9de915ac9b77cadc0ab730a62dc8f490de8bea05cc70b6295a192f03f
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT53:Rh+ZkldDPK8YaKj3
Static task
static1
Behavioral task
behavioral1
Sample
3ee9bb2a97d8c7c76420a9981dc9ac364b2a105c33abac60a0b0789f2d22fd21.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ee9bb2a97d8c7c76420a9981dc9ac364b2a105c33abac60a0b0789f2d22fd21.exe
Resource
win10v2004-20240910-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
3ee9bb2a97d8c7c76420a9981dc9ac364b2a105c33abac60a0b0789f2d22fd21
-
Size
952KB
-
MD5
ceb7415cfaf5ab864ef96492ad44adf8
-
SHA1
57ccb5c4e283232a8811b926f9399ef9d512481a
-
SHA256
3ee9bb2a97d8c7c76420a9981dc9ac364b2a105c33abac60a0b0789f2d22fd21
-
SHA512
9cd9379026c52e80ef71d84d6c4d27b078fbff2eb07f88e9c11980b7399325aec22535d9de915ac9b77cadc0ab730a62dc8f490de8bea05cc70b6295a192f03f
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT53:Rh+ZkldDPK8YaKj3
Score10/10-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-