General
-
Target
43SjNv5s.exe
-
Size
21KB
-
Sample
201201-bfqa3ap92x
-
MD5
aa9f37ce187d4b4556807f49f57ca678
-
SHA1
d4c05259f35840e96232bc41e1bd14defc73988f
-
SHA256
ae53e7a0d59686d3684ed1e14bfee649f53a5fd369090d916a81f74091368b65
-
SHA512
1f0aed05bc5574f62f8cfe3bf586390dd98e25593f17b8178029fdbdaa96d819de758f0dbdc65ef2163478def9caeb0ac9fb4689c04e71156c4967496a965baa
Static task
static1
Behavioral task
behavioral1
Sample
43SjNv5s.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
43SjNv5s.exe
Resource
win10v20201028
Malware Config
Extracted
revengerat
Guest
4.tcp.ngrok.io:13284
RV_MUTEX-sawrHJfWfhaRClg
Targets
-
-
Target
43SjNv5s.exe
-
Size
21KB
-
MD5
aa9f37ce187d4b4556807f49f57ca678
-
SHA1
d4c05259f35840e96232bc41e1bd14defc73988f
-
SHA256
ae53e7a0d59686d3684ed1e14bfee649f53a5fd369090d916a81f74091368b65
-
SHA512
1f0aed05bc5574f62f8cfe3bf586390dd98e25593f17b8178029fdbdaa96d819de758f0dbdc65ef2163478def9caeb0ac9fb4689c04e71156c4967496a965baa
Score10/10-
RevengeRat Executable
-
Executes dropped EXE
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory
-