Behavioral task
behavioral1
Sample
c3fbce6060e5dd45a0bcdb7b5214ce4f635a7bf0d6cf946dd4eaa522b696e451.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3fbce6060e5dd45a0bcdb7b5214ce4f635a7bf0d6cf946dd4eaa522b696e451.exe
Resource
win10v2004-20240226-en
General
-
Target
c3fbce6060e5dd45a0bcdb7b5214ce4f635a7bf0d6cf946dd4eaa522b696e451
-
Size
16KB
-
MD5
35c9be03680a163f5078b6cfad263b7a
-
SHA1
ac111552c65d6273a1ce5b8065ef82ff63b990bf
-
SHA256
c3fbce6060e5dd45a0bcdb7b5214ce4f635a7bf0d6cf946dd4eaa522b696e451
-
SHA512
9a39f74b70aae7cc944efb60413690c7002603339ccd6defc17fa5cf621b77992fabe5da9322cf193748a124b7015edc8b9dd445e82484a34bd4f95d481acf03
-
SSDEEP
384:RfTZMRYiVdf2QyYIL9oDPlMNcLlb5sVKWyz5Ct:RfTZMRYiVdu3xclMNENo
Malware Config
Extracted
revengerat
Guest
147.185.221.16:5563
RV_MUTEX
Signatures
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule sample revengerat -
Revengerat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource c3fbce6060e5dd45a0bcdb7b5214ce4f635a7bf0d6cf946dd4eaa522b696e451
Files
-
c3fbce6060e5dd45a0bcdb7b5214ce4f635a7bf0d6cf946dd4eaa522b696e451.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ