Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
file
-
Size
16KB
-
MD5
34ac5ff36b6e50f208c64ac1dbb70c9b
-
SHA1
b3e475810f772a54b6a0d44356e62e015b6abb54
-
SHA256
03e6043a9dc35b10400bd0e81a62977b05e7ecf941524673bdcdcae9e012cb07
-
SHA512
1c286755d64fd72ead82799d52665c743b2caf57611a605f335c12997b7fedbe81ca55d1505fb7108900b578b638a0c1201255d014f19b17deae396800d2a3ee
Score
10/10
Malware Config
Extracted
Family
revengerat
Botnet
Guest
C2
127.0.0.1:2302
Mutex
RV_MUTEX
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
file.exe windows x86