Static task
static1
Behavioral task
behavioral1
Sample
9807eab3875d515902293238427e6d3e8bb2b2f61b29e4931d1ad8f166b54ce4.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
9807eab3875d515902293238427e6d3e8bb2b2f61b29e4931d1ad8f166b54ce4.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
9807eab3875d515902293238427e6d3e8bb2b2f61b29e4931d1ad8f166b54ce4
-
Size
16KB
-
MD5
3991cc0022af695bcbcab7600c7af755
-
SHA1
3ad5c30ce79e7e1f9cd4933499af9839a3050a67
-
SHA256
9807eab3875d515902293238427e6d3e8bb2b2f61b29e4931d1ad8f166b54ce4
-
SHA512
d75fda43db70ca93edb92126fd6e44d3bdd515a5e18b8627354426210ddba82e1d6fbd8b1597b35fd0e63a534782b6f4fae106b08cbc61b7b0d54ec4401f16dc
Score
10/10
Malware Config
Extracted
Family
revengerat
Botnet
Guest
C2
svchost.ooguy.com:1122
Mutex
RV_MUTEX-YZblRvZwfRtNH
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
9807eab3875d515902293238427e6d3e8bb2b2f61b29e4931d1ad8f166b54ce4.exe windows x86