General
-
Target
28b565a813b2920d60f918e89d9a441d9ba61a3382df1c5eaa6c0139f2070ce3N
-
Size
903KB
-
Sample
241031-nr6ayawkbx
-
MD5
e13f9115a7020fab82edb50408dd9ef0
-
SHA1
41da2912716ec28999494103ec38785231b4f143
-
SHA256
28b565a813b2920d60f918e89d9a441d9ba61a3382df1c5eaa6c0139f2070ce3
-
SHA512
029f0487cf5ef31ec4b3a366b0a531d966a2813cdfcabf29e67d28ab653147e083fcd7c8283d3c378ec7cae008dacaec32ffbd9e00b6811a38bcc3afadd52a80
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5x:gh+ZkldoPK8YaKGx
Static task
static1
Behavioral task
behavioral1
Sample
28b565a813b2920d60f918e89d9a441d9ba61a3382df1c5eaa6c0139f2070ce3N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
28b565a813b2920d60f918e89d9a441d9ba61a3382df1c5eaa6c0139f2070ce3N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
28b565a813b2920d60f918e89d9a441d9ba61a3382df1c5eaa6c0139f2070ce3N
-
Size
903KB
-
MD5
e13f9115a7020fab82edb50408dd9ef0
-
SHA1
41da2912716ec28999494103ec38785231b4f143
-
SHA256
28b565a813b2920d60f918e89d9a441d9ba61a3382df1c5eaa6c0139f2070ce3
-
SHA512
029f0487cf5ef31ec4b3a366b0a531d966a2813cdfcabf29e67d28ab653147e083fcd7c8283d3c378ec7cae008dacaec32ffbd9e00b6811a38bcc3afadd52a80
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5x:gh+ZkldoPK8YaKGx
Score10/10-
Revengerat family
-
Drops startup file
-
Suspicious use of SetThreadContext
-