General
-
Target
5d0adbde7a56ddf190fbba91ec48e096bf1564d183367e2bf1168c41e842d72d
-
Size
952KB
-
Sample
240926-3e253stcrk
-
MD5
af60ab5ec8679c02f41649410e9bdbaa
-
SHA1
419c4d943495ee76add69255e7297457bcdc07fd
-
SHA256
5d0adbde7a56ddf190fbba91ec48e096bf1564d183367e2bf1168c41e842d72d
-
SHA512
4c8b00a283ab2ed9ffe9849d237958ce2d9771d7dd7e6fbca793f019f9179afcf028086c960aace237ba827b72f5ebdf4bcbe936e9d2b5217c5cd5d7bb05e50f
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5q:Rh+ZkldDPK8YaKjq
Static task
static1
Behavioral task
behavioral1
Sample
5d0adbde7a56ddf190fbba91ec48e096bf1564d183367e2bf1168c41e842d72d.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
5d0adbde7a56ddf190fbba91ec48e096bf1564d183367e2bf1168c41e842d72d
-
Size
952KB
-
MD5
af60ab5ec8679c02f41649410e9bdbaa
-
SHA1
419c4d943495ee76add69255e7297457bcdc07fd
-
SHA256
5d0adbde7a56ddf190fbba91ec48e096bf1564d183367e2bf1168c41e842d72d
-
SHA512
4c8b00a283ab2ed9ffe9849d237958ce2d9771d7dd7e6fbca793f019f9179afcf028086c960aace237ba827b72f5ebdf4bcbe936e9d2b5217c5cd5d7bb05e50f
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5q:Rh+ZkldDPK8YaKjq
Score10/10-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-