Static task
static1
Behavioral task
behavioral1
Sample
T7TCr4JE.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
T7TCr4JE.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
T7TCr4JE.exe
-
Size
16KB
-
MD5
244ce85ec13ed9838b10269194d06f28
-
SHA1
4f0aab03a01c37df602f1c67b9225a767969da5c
-
SHA256
53899e8e2ac9722fa19c52bdd9db99cc8e45429b0f73959805ee52628fb38334
-
SHA512
c4ef64da781e9b1ec48e5206c66228462e7208c325fef94602855fb4ff7b7091bf8a757e234c307783ce3da42e75e8b043a33e5e1ba66f4861f07e00ed5aa45d
Score
10/10
Malware Config
Extracted
Family
revengerat
Botnet
Guest
C2
tcp://revenge2-42566.portmap.host:42566
Mutex
RV_MUTEX
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
T7TCr4JE.exe.exe windows x86