Static task
static1
Behavioral task
behavioral1
Sample
279db53dc6911dfc4c8e36533af5a9cc189098b1021d67798e36cd7c514619a2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
279db53dc6911dfc4c8e36533af5a9cc189098b1021d67798e36cd7c514619a2.exe
Resource
win10v2004-20220414-en
General
-
Target
279db53dc6911dfc4c8e36533af5a9cc189098b1021d67798e36cd7c514619a2
-
Size
16KB
-
MD5
bfc03381b3765671418b0513ca05b5c9
-
SHA1
ee7cb6696611bf34aa5541c9866e33279d3b2e0f
-
SHA256
279db53dc6911dfc4c8e36533af5a9cc189098b1021d67798e36cd7c514619a2
-
SHA512
065965b10df8e68ad8753413ff434e1ba8e69388237ed6c48e563ff08ba6e90a2990dda30c1752d5d4a33fead9b50b51f608dd872ffd289727c362adf0cc9c0e
-
SSDEEP
384:yB8JbJPKd1Bf3rN579oDPlMNcLlb5sVKyyx5Ct:yBCNPKd1559clMNELo
Malware Config
Extracted
revengerat
Guest
127.0.0.1:333
127.0.0.1:2019
RV_MUTEX
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
279db53dc6911dfc4c8e36533af5a9cc189098b1021d67798e36cd7c514619a2.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ