General
-
Target
405b8979084d2466c48fcaf7d7317b0c8de33ae39b5b35afc6d2ad90d65da345.exe
-
Size
905KB
-
Sample
250110-3db79svpdp
-
MD5
74d2b0c080b09d661cffb16caf313bd4
-
SHA1
c1a16a2fef013f50bf4265f4e84dba908b218202
-
SHA256
405b8979084d2466c48fcaf7d7317b0c8de33ae39b5b35afc6d2ad90d65da345
-
SHA512
063faae117a71bdc98488e306bf325a8fd86ee8539ab08bb42e9b847f28a61f8d991b8f2a0a051c66a5eeaa48b92eb2be1935df487ac7cbd4dccf5c666f07112
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5K:gh+ZkldoPK8YaKGK
Static task
static1
Behavioral task
behavioral1
Sample
405b8979084d2466c48fcaf7d7317b0c8de33ae39b5b35afc6d2ad90d65da345.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
405b8979084d2466c48fcaf7d7317b0c8de33ae39b5b35afc6d2ad90d65da345.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
405b8979084d2466c48fcaf7d7317b0c8de33ae39b5b35afc6d2ad90d65da345.exe
-
Size
905KB
-
MD5
74d2b0c080b09d661cffb16caf313bd4
-
SHA1
c1a16a2fef013f50bf4265f4e84dba908b218202
-
SHA256
405b8979084d2466c48fcaf7d7317b0c8de33ae39b5b35afc6d2ad90d65da345
-
SHA512
063faae117a71bdc98488e306bf325a8fd86ee8539ab08bb42e9b847f28a61f8d991b8f2a0a051c66a5eeaa48b92eb2be1935df487ac7cbd4dccf5c666f07112
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5K:gh+ZkldoPK8YaKGK
Score10/10-
Revengerat family
-
Drops startup file
-
Suspicious use of SetThreadContext
-