General

  • Target

    0fb62cc606d4f89e154b921f67031b87ce6becc39392c21aa90fc495386a39ab.zip

  • Size

    7.3MB

  • MD5

    20f619f6bd928caa412624a16ad650a0

  • SHA1

    d1b133b6a80e9a486b2c31c6fbea3ca28b423a55

  • SHA256

    93bdb4995804bcb4009f4c255c10896c1b97554efdfcd8e5d5fb50adfa5e3084

  • SHA512

    b26199359852b7dabd6175d57abdafe7f949baa05887276201a8f573ab546888b1cec945d70f5bc8f0e67360a0e272956fb1115a2a381620a9e0cbdd8379fa1c

  • SSDEEP

    196608:x/EVs8Z6RCbqxD23GislnQrAuFS8jjr6G6b8WpR3X:x8V7ZcCboS3GiI4LrrubX

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

127.0.0.1:333

127.0.0.1:37734

127.0.0.1:17850

songs-travel.at.ply.gg:333

songs-travel.at.ply.gg:37734

songs-travel.at.ply.gg:17850

tcp://2.tcp.eu.ngrok.io:333

tcp://2.tcp.eu.ngrok.io:37734

tcp://2.tcp.eu.ngrok.io:17850

2.tcp.eu.ngrok.io:333

2.tcp.eu.ngrok.io:37734

2.tcp.eu.ngrok.io:17850

Mutex

Updater

Signatures

  • RevengeRat Executable 1 IoCs
  • Revengerat family
  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 0fb62cc606d4f89e154b921f67031b87ce6becc39392c21aa90fc495386a39ab.zip
    .zip

    Password: infected

  • 0fb62cc606d4f89e154b921f67031b87ce6becc39392c21aa90fc495386a39ab
    .zip
  • pidor-main/Cinoshi-miner.exe
    .exe windows:4 windows x64 arch:x64

    f7505c167603909b7180406402fef19e


    Code Sign

    Headers

    Imports

    Sections

  • pidor-main/Client.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • pidor-main/LC.exe
    .exe windows:5 windows x86 arch:x86

    46582683e79e897ced5eb8a1828704b3


    Code Sign

    Headers

    Imports

    Sections

  • pidor-main/README.md
  • pidor-main/crypted_lc.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections