Static task
static1
Behavioral task
behavioral1
Sample
0b3ca8fc417a9e5ac4101babf092999399fe7aadc4d8b68b4707e8297db0a08e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0b3ca8fc417a9e5ac4101babf092999399fe7aadc4d8b68b4707e8297db0a08e.exe
Resource
win10v2004-en-20220113
General
-
Target
0b3ca8fc417a9e5ac4101babf092999399fe7aadc4d8b68b4707e8297db0a08e
-
Size
16KB
-
MD5
99250e771feb3b70e4122bbc54a79f8e
-
SHA1
432d8117bc544918bdaecc01c6ce68305cfd2e86
-
SHA256
0b3ca8fc417a9e5ac4101babf092999399fe7aadc4d8b68b4707e8297db0a08e
-
SHA512
6f0bc3b1c7a73009d1ca71a3ad08fcf76d66e32e25cba9d7a547e95b178b1d5dd4699c07beb49add607063513c37158809ed640e1deb9011265b1bdf9f7fd284
-
SSDEEP
384:GWCWh/MwiWUW8WcRfH3dtr9oDPlMNcLlb5sVKly+5Ct:GWCWh/niWUW8WI/33clMNEJo
Malware Config
Extracted
revengerat
R A D
KevinDavis-58161.portmap.host:58161
RV_MUTEX
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
0b3ca8fc417a9e5ac4101babf092999399fe7aadc4d8b68b4707e8297db0a08e.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ