Analysis
-
max time kernel
94s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 06:19
Behavioral task
behavioral1
Sample
Revenge-RAT v3 - NYANxCAT.7z
Resource
win10-20240611-en
windows10-1703-x64
8 signatures
300 seconds
Behavioral task
behavioral2
Sample
Revenge-RAT v3 - NYANxCAT.7z
Resource
win10v2004-20241007-en
windows10-2004-x64
2 signatures
300 seconds
General
-
Target
Revenge-RAT v3 - NYANxCAT.7z
-
Size
9.0MB
-
MD5
d0bdec0ca22aa6cdeae1abfb44f94ed9
-
SHA1
e5664aaf5b0cbaad33bbb6fb0389721cc863e51f
-
SHA256
8d8a9d8dbce44201be05da52db0c628c5ee06ae550dbf398c456316d7b58497d
-
SHA512
105fdf3867f2f56661756bc3356718b18fcf301584c126c9e68d1cdd2bc2b34b773325d0f8501fbb994001d6dc44a6e7765ff1286c0a55e9ff12b82602ba0a5a
-
SSDEEP
196608:CVxJlefNigwBUIiGrlLVM5c0h1Jfyc1LcORe:KJlefQl+IiGZVM5cK1J6uY1
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 2276 7zFM.exe Token: 35 2276 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zFM.exepid process 2276 7zFM.exe