General
-
Target
client.exe
-
Size
503KB
-
Sample
250318-e1t5laxqy9
-
MD5
18027ab757117250f63fd4cecfb17554
-
SHA1
780bc94badbc0d1beb029c60e9023afc0351d265
-
SHA256
8176ff71185aa68a3d034ee352edb744808cc1c0c8b17ec188b0e0a87ec3d66f
-
SHA512
9b724169672519ada3730540e50cb0979d9f3db06e95aafb785ba713f04dd3108d05872f8acc11d72c51990e4f6084325d03bc866fff5979e18edc462cb20218
-
SSDEEP
12288:Hnh3gCeDX0PfUC2jykOJQVB3z6Lm//HFl2Qc7kc:HnTZNGB2LmGV7kc
Behavioral task
behavioral1
Sample
client.exe
Resource
win10ltsc2021-20250314-en
Malware Config
Extracted
revengerat
retard
127.0.0.1:333
127.0.0.1:21
127.0.0.1:443
127.0.0.1:80
212.102.63.147:333
212.102.63.147:21
212.102.63.147:443
212.102.63.147:80
RV_MUTEX-TwUnoWrUUgHRH
Targets
-
-
Target
client.exe
-
Size
503KB
-
MD5
18027ab757117250f63fd4cecfb17554
-
SHA1
780bc94badbc0d1beb029c60e9023afc0351d265
-
SHA256
8176ff71185aa68a3d034ee352edb744808cc1c0c8b17ec188b0e0a87ec3d66f
-
SHA512
9b724169672519ada3730540e50cb0979d9f3db06e95aafb785ba713f04dd3108d05872f8acc11d72c51990e4f6084325d03bc866fff5979e18edc462cb20218
-
SSDEEP
12288:Hnh3gCeDX0PfUC2jykOJQVB3z6Lm//HFl2Qc7kc:HnTZNGB2LmGV7kc
Score10/10-
Revengerat family
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-