General
-
Target
3550ac13a082e954d020ea83cac883bc9b6a778ae8ac9e66c4daa3211ab868f7.exe
-
Size
905KB
-
Sample
241202-lzhhqszpav
-
MD5
64c987d6441f145d3c93ddf603dce4fd
-
SHA1
12d5160f10d610d4710a5de898b61b284a86d173
-
SHA256
3550ac13a082e954d020ea83cac883bc9b6a778ae8ac9e66c4daa3211ab868f7
-
SHA512
c58eaa67e430fa88c33c91974813e81534c77246a1b96834105943baab2a0cc6a008026832e382ec9a319fcb75f71125156e53f2af664a23e3107a446eb7f435
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5S:gh+ZkldoPK8YaKGS
Static task
static1
Behavioral task
behavioral1
Sample
3550ac13a082e954d020ea83cac883bc9b6a778ae8ac9e66c4daa3211ab868f7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3550ac13a082e954d020ea83cac883bc9b6a778ae8ac9e66c4daa3211ab868f7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
3550ac13a082e954d020ea83cac883bc9b6a778ae8ac9e66c4daa3211ab868f7.exe
-
Size
905KB
-
MD5
64c987d6441f145d3c93ddf603dce4fd
-
SHA1
12d5160f10d610d4710a5de898b61b284a86d173
-
SHA256
3550ac13a082e954d020ea83cac883bc9b6a778ae8ac9e66c4daa3211ab868f7
-
SHA512
c58eaa67e430fa88c33c91974813e81534c77246a1b96834105943baab2a0cc6a008026832e382ec9a319fcb75f71125156e53f2af664a23e3107a446eb7f435
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5S:gh+ZkldoPK8YaKGS
Score10/10-
Revengerat family
-
Drops startup file
-
Suspicious use of SetThreadContext
-