Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
file
-
Size
17KB
-
MD5
af48897e401a79baf8086585c18cf8fe
-
SHA1
44e9a2699d07cbba45493000287ab5dfbe86df77
-
SHA256
acec05fb087440c24b6ac8a15051b8fc7fdfd92bdf458b165e1e19265395b595
-
SHA512
c65d348d3225e86909e33e9ef9717be72ea7f934b673f82748907f927c459c39e739dcb3ebcfc029b3fdd81d7a528cd2a025d01b28ded04a604a6375b13b8ea1
Score
10/10
Malware Config
Extracted
Family
revengerat
Botnet
Guest
C2
tzii.myq-see.com:888
Mutex
RV_MUTEX-IUnoWrUUgHRHXJv
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
file.exe windows x86