Behavioral task
behavioral1
Sample
Test.exe
Resource
win10-20230621-en
General
-
Target
Test.exe
-
Size
16KB
-
MD5
882177e58293fb9367a89a760fb78dca
-
SHA1
0af6ee56e715dbd15ccee8710ad67a4e9842896c
-
SHA256
7f1f34b9ff27c703a186f84488ba4dc80d9179d198244e8cdc6f8a6845e8bb26
-
SHA512
ff9bea08d1af9efc8c1f8395bc2b6edd708486dc380beb3a52ea1efed0ce87df6820676141afe3bc6a015ce9c23d44e74266a00602573221fa3f30ddb8bdb440
-
SSDEEP
384:V/5gk7lVzF3smf9oDPlMNcLlb5sVKhy75Ct:V/5gk7lVZjclMNEYo
Malware Config
Extracted
revengerat
Guest
127.0.0.1:333
RV_MUTEX
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Test.exe
Files
-
Test.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ