General

  • Target

    fd9f4bc99e7a969551c859d3da5dfd6c4151a20c9663619a4b14be7958c34e0e

  • Size

    17KB

  • MD5

    4a1e9090a6a6bc9dda8706d35e5ef027

  • SHA1

    8f8a66cb388f0ed59c46c3bc23c95c6724b8c2be

  • SHA256

    fd9f4bc99e7a969551c859d3da5dfd6c4151a20c9663619a4b14be7958c34e0e

  • SHA512

    961e334b79d36a781f732f6e4116d84b99d7fb2063e94bd901d42a092d664141e59ff4d7cade49d848ee16cd5be8bba3e849c9a12b8c24469e5a7aa264cfd33a

  • SSDEEP

    192:pQ61GFr2aDBBT02FLYnAdfYMaqsCrXbr+jF9nsVVIuwgXyKv0+2ctH:d18DBZBFJZeCrXbQsVKcyKc+2ctH

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

0.tcp.ngrok.io:17455

Mutex

RV_MUTEX-iYAoBLOacwYd

Signatures

  • RevengeRat Executable 1 IoCs
  • Revengerat family

Files

  • fd9f4bc99e7a969551c859d3da5dfd6c4151a20c9663619a4b14be7958c34e0e
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections