Analysis
-
max time kernel
32s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
Apocalypse RAT 1.4.4.rar
Resource
win7-20240903-en
windows7-x64
20 signatures
150 seconds
Behavioral task
behavioral2
Sample
Apocalypse RAT 1.4.4.rar
Resource
win10v2004-20241007-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
Apocalypse RAT 1.4.4.rar
-
Size
2.6MB
-
MD5
2dbd62a86821c748dd1b5d576a424668
-
SHA1
d22a0071f27f1173c04d06fddacc318705f2a820
-
SHA256
1272e2bacba1e801708f93cedb19fecf3b009633b46979730209672db9c53a21
-
SHA512
ac781e1350b53d3eb4aeb0262130146fe2e3ee6dc67ac828820cec738e3b4cdfa32183f43f61ec11fee4fc83d63aca8089c5daa92aa1d1f5291e0775d7e5f223
-
SSDEEP
49152:YTjYUZI02JpoOPiDnxTqQswz8d/glL1II3PBW2rIk5ywp54Qz7xvYM:EjYUHcpoftTqQJIcF3JW20YX4s7pH
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 532 7zFM.exe Token: 35 532 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 532 7zFM.exe