General
-
Target
613e8b0872c9fcb73c54ffe37615eada8a88821f78bf4f58f9913b3f3fbdab94
-
Size
904KB
-
Sample
241201-2hs6xazpfq
-
MD5
7e99e4a618ec794f38849fe4f7419a36
-
SHA1
5a84d9c48a6c714c5d23aec10cf70e95e8d79dc3
-
SHA256
613e8b0872c9fcb73c54ffe37615eada8a88821f78bf4f58f9913b3f3fbdab94
-
SHA512
f5d2339c15663a9c3a89a40ff62248ae1c4b720dddcf9f7350e74590446bfb1ec08e7e53c9bf894a31dd034d95a40bac358daab92ce3adc0957f561e45980196
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5g:gh+ZkldoPK8YaKGg
Static task
static1
Behavioral task
behavioral1
Sample
613e8b0872c9fcb73c54ffe37615eada8a88821f78bf4f58f9913b3f3fbdab94.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
613e8b0872c9fcb73c54ffe37615eada8a88821f78bf4f58f9913b3f3fbdab94.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
613e8b0872c9fcb73c54ffe37615eada8a88821f78bf4f58f9913b3f3fbdab94
-
Size
904KB
-
MD5
7e99e4a618ec794f38849fe4f7419a36
-
SHA1
5a84d9c48a6c714c5d23aec10cf70e95e8d79dc3
-
SHA256
613e8b0872c9fcb73c54ffe37615eada8a88821f78bf4f58f9913b3f3fbdab94
-
SHA512
f5d2339c15663a9c3a89a40ff62248ae1c4b720dddcf9f7350e74590446bfb1ec08e7e53c9bf894a31dd034d95a40bac358daab92ce3adc0957f561e45980196
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5g:gh+ZkldoPK8YaKGg
Score10/10-
Revengerat family
-
Drops startup file
-
Suspicious use of SetThreadContext
-