Overview
overview
10Static
static
3SendBlaste...ed.zip
windows7-x64
1SendBlaste...ed.zip
windows10-2004-x64
10Password.txt
windows7-x64
1Password.txt
windows10-2004-x64
1SendBlaste...ys.txt
windows7-x64
1SendBlaste...ys.txt
windows10-2004-x64
1SendBlaste...r4.exe
windows7-x64
3SendBlaste...r4.exe
windows10-2004-x64
3SendBlaste...me.txt
windows7-x64
1SendBlaste...me.txt
windows10-2004-x64
1SendBlaste...up.exe
windows7-x64
10SendBlaste...up.exe
windows10-2004-x64
10General
-
Target
SendBlaster Pro Edition v4.4.2 Full Activated.zip
-
Size
43.1MB
-
Sample
250115-ajdn3atpht
-
MD5
b1eb24d60ee31ae7f3416d3246b39755
-
SHA1
277cbc5f5ce0596f6532ed189c64322b2d35fa74
-
SHA256
d5b1ac3b25761e72ce3213775a37d41505c4cd1adf2f4c25fc806efb04f0500f
-
SHA512
0ac65cc84dfb685a6169da31bbc8335a2d7c6a22980e4a3856e829209c3c157c30ec2cec0a649bc6b80ae2ee8d29dd89e37fc205f266e40d3d9784b9a1a9550b
-
SSDEEP
786432:ItpOGxY7c2ps+KjC43AG5lwvbZOF2m9wnJXwTUO72bnsSQ0PEldBF:0pY7ckb831Uzc2m9wnJATKl1kd/
Static task
static1
Behavioral task
behavioral1
Sample
SendBlaster Pro Edition v4.4.2 Full Activated.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SendBlaster Pro Edition v4.4.2 Full Activated.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Password.txt
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Password.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
SendBlaster Pro Edition v4.4.2 Full Activated/Crack/Keys.txt
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
SendBlaster Pro Edition v4.4.2 Full Activated/Crack/Keys.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
SendBlaster Pro Edition v4.4.2 Full Activated/Crack/sendblaster4.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SendBlaster Pro Edition v4.4.2 Full Activated/Crack/sendblaster4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
SendBlaster Pro Edition v4.4.2 Full Activated/Readme.txt
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
SendBlaster Pro Edition v4.4.2 Full Activated/Readme.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
SendBlaster Pro Edition v4.4.2 Full Activated/Sendblaster Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
SendBlaster Pro Edition v4.4.2 Full Activated/Sendblaster Setup.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
revengerat
NyanCatRevenge
amazon.capeturk.com:100
eea5a83186824927836
Targets
-
-
Target
SendBlaster Pro Edition v4.4.2 Full Activated.zip
-
Size
43.1MB
-
MD5
b1eb24d60ee31ae7f3416d3246b39755
-
SHA1
277cbc5f5ce0596f6532ed189c64322b2d35fa74
-
SHA256
d5b1ac3b25761e72ce3213775a37d41505c4cd1adf2f4c25fc806efb04f0500f
-
SHA512
0ac65cc84dfb685a6169da31bbc8335a2d7c6a22980e4a3856e829209c3c157c30ec2cec0a649bc6b80ae2ee8d29dd89e37fc205f266e40d3d9784b9a1a9550b
-
SSDEEP
786432:ItpOGxY7c2ps+KjC43AG5lwvbZOF2m9wnJXwTUO72bnsSQ0PEldBF:0pY7ckb831Uzc2m9wnJATKl1kd/
-
Revengerat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
Password.txt
-
Size
79B
-
MD5
2e0a168682fadf1654cb2068cf326d51
-
SHA1
36c61dafe8a7134614f94e047781b1938163050e
-
SHA256
883b28febe1e0fbe99cc3b085b7ccdaa840609566026718775c547085f4e8fa0
-
SHA512
2d07c3737d09d7b92e4760018bd499050e30cef3a8fdd2c3ce4236b9183e3f50346f693fb3aa4f940028a42f6fdb643ba9b655df44d11d56b12ca368b617304c
Score1/10 -
-
-
Target
SendBlaster Pro Edition v4.4.2 Full Activated/Crack/Keys.txt
-
Size
322B
-
MD5
c2a1f4cd3be4a6f1dcb0f94507a774bf
-
SHA1
10e27dc146b73d496e88554ce27622512986106c
-
SHA256
25d912d729d3705e5cc76e66399315a2e37c1a115a1d42968504c468dd20e33f
-
SHA512
5ce4742692a6702970a620236bb1e8ae15b89a8a96ea04af0943b443dbecfb30bcba5e224450fd9b1e7e6d10325adf8ec632e860329f0d34b3aad0a33cb41394
Score1/10 -
-
-
Target
SendBlaster Pro Edition v4.4.2 Full Activated/Crack/sendblaster4.exe
-
Size
13.3MB
-
MD5
e63d295971421b43438fca8b151f6a9a
-
SHA1
b55ee9c37a573a340407c6bf2f9cb774bf2e9efb
-
SHA256
2b0da63ac42341947e4cd3d328ea1944ad48ae14f909477933c7efcd4a3f2e64
-
SHA512
3dddf727b9e39e7f389852718bc7f4e395c09e8e5a509dd2ae432cad8fd3e85dee9354017add79a82f907efbf3ee6ed043f8648b9db88eb3425e668a5ef36fa0
-
SSDEEP
196608:wHrj7m3bLra9IhegWH4Ix9ScNJ/pv4470YvBc3WMH+OQEomT0FtO39at:wHr3mzlGd9
Score3/10 -
-
-
Target
SendBlaster Pro Edition v4.4.2 Full Activated/Readme.txt
-
Size
170B
-
MD5
640fabc9199e83873e36ce89b8f922bf
-
SHA1
e925027f8bbb0afe6f4205b1a64ea84149c7bcc4
-
SHA256
caece8822822c0c3b63c95d45ab24a19167004bddaa8740090ab336bd7d1cf8a
-
SHA512
78cc942bb20f883bb73459b6db651711ffef289dd43a87cf0084ef331779881a200ea4f9f1a6197e61755b969bcfdef663512447f38fa4c4e783ed37f8743aca
Score1/10 -
-
-
Target
SendBlaster Pro Edition v4.4.2 Full Activated/Sendblaster Setup.exe
-
Size
44.6MB
-
MD5
227915d05ebba701f451ddff34341f8a
-
SHA1
f7f1b90626a41b86c170df89a8734e57b5b1c364
-
SHA256
90a768fd29d2852b719938bb18a0727889a44793cbf64ea77498124746fd6f7d
-
SHA512
1cb6a6680dacc2960574b10f7e9c6c27e735daa38ff5b4e8b7cba2f817770c2d45971be33b42a6ee2ea839cc16be9cfbd689458c9242160912aeb1ba88f4ba0f
-
SSDEEP
786432:MKRjDDcwN5pfH+wVhYpePLvojtIeOSK76UVA4OUzl4DpmsIEN:3NncwcImoPLojwSeVOUpWosI
-
Revengerat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1