Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 13:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe
-
Size
350KB
-
MD5
c9ad8f950e975cecfc2e85b79326b4f4
-
SHA1
aecc6400d68559ba92637292644ade24e02b9ddb
-
SHA256
c9997d5664a47fac12a286025f182ae425a9cf65795ec237b9649a45348273d3
-
SHA512
0b8825ae1b9bfbf408768c50129c0274ff1b62a1dbe325a3bc8803715ea64059a4c5b898a35e2b32465930f426d713cbf28c4fc2e1f1c6a673163d9aa0d34418
-
SSDEEP
3072:GUBA5vrL4pq/LABoKxhuKqoa4HLImWV2l+Rp954GvmoLA+rH8BJMM+lmsolAIrRL:05X4pyLAidskFRxrvq+lDAAs
Malware Config
Extracted
revengerat
SPAM
kilimanjaro.cloudns.nz:8809
kilimanjaro.run.place:8809
kilimanjaro.crabdance.com:8809
kilimanjaro.bigmoney.biz:8809
kilimanjaro.theworkpc.com:8809
burkinafaso.duckdns.org:8809
RV_MUTEX-GYuaWVCGnhpCsG
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/1556-1-0x00000000000D0000-0x000000000012A000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1556 set thread context of 3344 1556 2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1556 wrote to memory of 3344 1556 2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe 86 PID 1556 wrote to memory of 3344 1556 2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe 86 PID 1556 wrote to memory of 3344 1556 2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe 86 PID 1556 wrote to memory of 3344 1556 2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe 86 PID 1556 wrote to memory of 3344 1556 2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe 86 PID 1556 wrote to memory of 3344 1556 2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe 86 PID 1556 wrote to memory of 3344 1556 2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2024-10-30_c9ad8f950e975cecfc2e85b79326b4f4_hiddentear_hijackloader.exe.log
Filesize520B
MD541c37de2b4598f7759f865817dba5f80
SHA1884ccf344bc2dd409425dc5ace0fd909a5f8cce4
SHA256427235491a8da3fc8770ed60d30af731835c94585cd08d4d81fca9f703b283bc
SHA512a8f3c74916623de100e4cf22e05df9cdf541b1e32443aab0434f35fb9c4a7fa950b997ce589b532e65731ae471a1f152cd5c00ea1df4bd7a6b57eb27c93c54bd