Behavioral task
behavioral1
Sample
5ee9ba4151a71fba2b5087c16befe97e779ca5cd72e79cc394031a07814d377d.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5ee9ba4151a71fba2b5087c16befe97e779ca5cd72e79cc394031a07814d377d.exe
Resource
win10v2004-20220721-en
General
-
Target
5ee9ba4151a71fba2b5087c16befe97e779ca5cd72e79cc394031a07814d377d
-
Size
17KB
-
MD5
b10508bc30db2fd82c33ac305f58c79a
-
SHA1
47bd2d8852a688b0c849baba210518f69b6dcfd2
-
SHA256
5ee9ba4151a71fba2b5087c16befe97e779ca5cd72e79cc394031a07814d377d
-
SHA512
7b3f7f2594925b7c81a75f7737c7475c7e471058c81cfa9b8ac992230256859e2e849fe169a7dcf5ea24e4f3c97b815f97587a626ec748ee2f852da5e33a4ea4
-
SSDEEP
384:PkaqaxHN88Yfii4ZsGYojDWbXsVV+ygykYYZt:P5qmtzYMsxojk+4YI
Malware Config
Extracted
revengerat
Guest
mookdla.myq-see.com:2040
127.0.0.1:2040
RV_MUTEX-DxjEexVoqqNL
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
5ee9ba4151a71fba2b5087c16befe97e779ca5cd72e79cc394031a07814d377d.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ