Behavioral task
behavioral1
Sample
43023de4ae38501491783084f7add67713f186b84bb044d51f048d468d95d981.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
43023de4ae38501491783084f7add67713f186b84bb044d51f048d468d95d981.exe
Resource
win10v2004-20220812-en
General
-
Target
43023de4ae38501491783084f7add67713f186b84bb044d51f048d468d95d981
-
Size
16KB
-
MD5
fe0100a08b9fdcd53bf96863c045d8e6
-
SHA1
033e30901b834141aed947c343f7a7f9d00630b0
-
SHA256
43023de4ae38501491783084f7add67713f186b84bb044d51f048d468d95d981
-
SHA512
156ea2a79f7f34554e6d4c788af7a92cffb1a32bcf228ffa4bc19fbb37afc983183f7e8b0d094104e7f3ffde6ee6d16b4eab9ea52ee5992c1fb5be118da99d42
-
SSDEEP
384:3WCWh/MwiWUW8WcRfH3dtr9oDPlMNcLlb5sVKhyJ5Ct:3WCWh/niWUW8WI/33clMNEuo
Malware Config
Extracted
revengerat
Guest
192.168.1.4:1231
RV_MUTEX
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
43023de4ae38501491783084f7add67713f186b84bb044d51f048d468d95d981.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ