Behavioral task
behavioral1
Sample
6481f9e27bec4cf6702b6d6a09761c62782f5010da0dfd0a396575c60200279d.exe
Resource
win10v2004-20230220-en
General
-
Target
6481f9e27bec4cf6702b6d6a09761c62782f5010da0dfd0a396575c60200279d
-
Size
17KB
-
MD5
655f6edee75a4cc49a8fa34567037da9
-
SHA1
9ff2fc0ccc94230411c3f1507c648867e2306f14
-
SHA256
6481f9e27bec4cf6702b6d6a09761c62782f5010da0dfd0a396575c60200279d
-
SHA512
69754378ec7480c708aa3b7e979d0ec465b3e499e811d4a89ff1d5b863f7a796f8d5893fdcc90831c1374dd63782de3d02a06934564ddd1406fcbce98c63d89b
-
SSDEEP
384:kGbJcK05FdBu6wCX9oDPlMNcLlb5sVKOyv5Ct0:kGbqK2DQUclMNEhou
Malware Config
Extracted
revengerat
Guest
127.0.0.1:333
127.0.0.1:37734
127.0.0.1:12792
songs-travel.at.ply.gg:333
songs-travel.at.ply.gg:37734
songs-travel.at.ply.gg:12792
tcp://5.tcp.eu.ngrok.io:333
tcp://5.tcp.eu.ngrok.io:37734
tcp://5.tcp.eu.ngrok.io:12792
RV_MUTEX
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
Files
-
6481f9e27bec4cf6702b6d6a09761c62782f5010da0dfd0a396575c60200279d.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ