Static task
static1
Behavioral task
behavioral1
Sample
39ca0763bd03a8d005101682a0cc6fec9bbef0549effe79a1405eab59635ef08.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
39ca0763bd03a8d005101682a0cc6fec9bbef0549effe79a1405eab59635ef08.exe
Resource
win10v2004-20220414-en
General
-
Target
39ca0763bd03a8d005101682a0cc6fec9bbef0549effe79a1405eab59635ef08
-
Size
18KB
-
MD5
1a506f45ee5eb2764fdf980f0fbaf7ca
-
SHA1
6dd081bb7b55540bcf9896c6cfbf037d73f03f4a
-
SHA256
39ca0763bd03a8d005101682a0cc6fec9bbef0549effe79a1405eab59635ef08
-
SHA512
ed99e3c1c64942af342da0e400463fae33c17496c4fe8ce9d33d26546eb221066b556df24b38d6659d49910d2c28fcde1fc67f7cd8c38266ab00148c85eeda7c
-
SSDEEP
192:+q1WUY9AiDE4LTYNlEqYJ8rDenLPXw5MoiwH7abHG+jR9nsVVIZDxybC+2c:5WVDlm+njHoiwH7ab9sVKdxybC+2c
Malware Config
Extracted
revengerat
Anoy
anoy.zapto.org:1155
RV_MUTEX-rClgZblRvZwfR
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
39ca0763bd03a8d005101682a0cc6fec9bbef0549effe79a1405eab59635ef08.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ