Behavioral task
behavioral1
Sample
2024-10-15_4311b98ae24dfad35d91b838e1102e4a_hiddentear.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-15_4311b98ae24dfad35d91b838e1102e4a_hiddentear.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-15_4311b98ae24dfad35d91b838e1102e4a_hiddentear
-
Size
192KB
-
MD5
4311b98ae24dfad35d91b838e1102e4a
-
SHA1
db965f0311ccbe7e2564137d09ba50675281dc47
-
SHA256
f5af35e229884910512cb214f76e9fa43adf5888a689c2b079a07e5b2a504806
-
SHA512
75c1b5355ad8b7fa6d0e4af5aa25640ab74624c907054fa51209bfe8c107438b05c0e7d8562c3cfd712ac47e9099a086d0eec01dfc3763b75f5c39a13b7e7270
-
SSDEEP
3072:DkHAOz+xTmGz0rhSZNtXLM+lmsopID8Zb7:c+510dmtg+lDdu
Malware Config
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-10-15_4311b98ae24dfad35d91b838e1102e4a_hiddentear
Files
-
2024-10-15_4311b98ae24dfad35d91b838e1102e4a_hiddentear.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ