Static task
static1
Behavioral task
behavioral1
Sample
209a3bee9b7bc06c8aaa8c607df850ec05f58892e6ea1cfec2cbbdab6501ee2f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
209a3bee9b7bc06c8aaa8c607df850ec05f58892e6ea1cfec2cbbdab6501ee2f.exe
Resource
win10v2004-20220414-en
General
-
Target
209a3bee9b7bc06c8aaa8c607df850ec05f58892e6ea1cfec2cbbdab6501ee2f
-
Size
16KB
-
MD5
22dd5f71f6e77f1f9ab88d898bf65a73
-
SHA1
c811146aa5e4bbe1927a47f6462655677c19b951
-
SHA256
209a3bee9b7bc06c8aaa8c607df850ec05f58892e6ea1cfec2cbbdab6501ee2f
-
SHA512
9cf908242ee484835924f840950dd0552f4dad3b11074f2a69cc628c6bcdd2654e2822362e451e62ea301009dba7b0d52705af87e523b7132f9bfdb878148383
-
SSDEEP
384:NDmPni19PBDdd79oDPlMNcLlb5sVKgyY5Ct:NDmPni19N3clMNEQo
Malware Config
Extracted
revengerat
vikas
127.0.0.1:4040
RV_MUTEX-eawrHJfWfhaR
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
209a3bee9b7bc06c8aaa8c607df850ec05f58892e6ea1cfec2cbbdab6501ee2f.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ