Static task
static1
Behavioral task
behavioral1
Sample
0d398359c66e65c7c23e23f98732593a6a7a1eb91947249b639f3443fd65b36e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0d398359c66e65c7c23e23f98732593a6a7a1eb91947249b639f3443fd65b36e.exe
Resource
win10v2004-20220414-en
General
-
Target
0d398359c66e65c7c23e23f98732593a6a7a1eb91947249b639f3443fd65b36e
-
Size
104KB
-
MD5
44f3a040393c88dcb5277ee7fce82211
-
SHA1
c2f12d9514a33a9d8debf6c3bb6fb2d80ce62ad0
-
SHA256
0d398359c66e65c7c23e23f98732593a6a7a1eb91947249b639f3443fd65b36e
-
SHA512
6673a96115f3d1f311efb3102d5679bd1797298e389e076dc46898c84d4d665380cf77cb3c58a6ab0b8378d2888cfc73cd49836ea278d597878a34ffbfb15da7
-
SSDEEP
1536:DjEvFOMjove/kYuqiEDO+1xbXK1kFwVRX37jBqa3D3tSYfChz:XEvFOMjMCkYuqiEDO+1xvFwXj19SY
Malware Config
Extracted
revengerat
system
myrevenge.ddns.net:1337
RV_MUTEX-YFYEKgHDMFLRMS
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
0d398359c66e65c7c23e23f98732593a6a7a1eb91947249b639f3443fd65b36e.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ