Static task
static1
Behavioral task
behavioral1
Sample
5bbabb2462f89003e7dcfb31aa700cf20573d6813bda784f1c24b4cc913d57f9.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
5bbabb2462f89003e7dcfb31aa700cf20573d6813bda784f1c24b4cc913d57f9.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
5bbabb2462f89003e7dcfb31aa700cf20573d6813bda784f1c24b4cc913d57f9
-
Size
16KB
-
MD5
c40cc1e86c9759a61f80052991c213a6
-
SHA1
196a4b21e3620e54a8613461e8d7ca5e2d598c03
-
SHA256
5bbabb2462f89003e7dcfb31aa700cf20573d6813bda784f1c24b4cc913d57f9
-
SHA512
87eb42778bc700bd2109eb3fed1de2ed4458807482a1db5b3ca84ee8840e9e43aa947de4a200229e8a759056603ef4e4562be34f2f1ec080aed8189b8b3dbf78
Score
10/10
Malware Config
Extracted
Family
revengerat
Botnet
Guest
C2
karraraliali123:8080
Mutex
RV_MUTEX
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
5bbabb2462f89003e7dcfb31aa700cf20573d6813bda784f1c24b4cc913d57f9.exe windows x86