Static task
static1
Behavioral task
behavioral1
Sample
54597457312f485a9262911166ff12ec305e9d9e6274db650c01ba7d948005db.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
54597457312f485a9262911166ff12ec305e9d9e6274db650c01ba7d948005db.exe
Resource
win10v2004-20220414-en
General
-
Target
54597457312f485a9262911166ff12ec305e9d9e6274db650c01ba7d948005db
-
Size
54KB
-
MD5
7758640fa5f27a2e4f760f058b35b07e
-
SHA1
aad34d9481f29d502784ee69944ef7910525377f
-
SHA256
54597457312f485a9262911166ff12ec305e9d9e6274db650c01ba7d948005db
-
SHA512
bb8e0158eb0227d3c66694ed59c1238e724e7555cd06f551e11d759d1f2f7fa48bea9fc29ad9bc1c4ba68f90f0731971a7bfb5454f82e8e6ab5ce7521094effc
-
SSDEEP
384:tB8JbJPKd1Bf3rN5L9bVNc2lb5sQCUyV5CtkAWSaT5vK2mVc4J1:tBCNPKd155dVVN3Mo1WlyNVZJ
Malware Config
Extracted
revengerat
Guest
rabotay.giize.com:9292
RV_MUTEX-PejYAoBLOacwY
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
54597457312f485a9262911166ff12ec305e9d9e6274db650c01ba7d948005db.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ