Static task
static1
Behavioral task
behavioral1
Sample
91d6aa195fef506ad74e4671dfe30eb6.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
91d6aa195fef506ad74e4671dfe30eb6.exe
Resource
win10v2004-20220310-en
General
-
Target
91d6aa195fef506ad74e4671dfe30eb6.exe
-
Size
17KB
-
MD5
91d6aa195fef506ad74e4671dfe30eb6
-
SHA1
6bdcb490bd82e22acde9742f4d08b205ce1660ec
-
SHA256
a118f361223ac18069b6aeb89baec7e918a99b42ea171250c3e9bc4c314a8b2e
-
SHA512
401534e04f0511d6efaac2ff5cdee83229262fe90e3e104513b380fcf7cb9f43d1f672630f08cfbfd110ec564d5756f64aefad22caaa3a4b426f79dabf56a035
Malware Config
Extracted
revengerat
Guest
127.0.0.1:333
127.0.0.1:16025
4.tcp.ngrok.io:333
4.tcp.ngrok.io:16025
RV_MUTEX
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
91d6aa195fef506ad74e4671dfe30eb6.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ