General

  • Target

    Server.exe

  • Size

    17KB

  • MD5

    d1e987c30aafe7fe3a5f09abf3b074b9

  • SHA1

    8a89c607a448469cb097b942ada7635c018d21b0

  • SHA256

    3ddaf98eb8bdeed1f21096d666af87cb9eb11205b1ad1e35ed432ef971329975

  • SHA512

    61081410d3fa9d565b4076d4d98a6a3aba06a8c1ca6e211377a7b36b2706b96d7128f11db36dfc982824fa905e73dd66f8daaf93929db8bb72820296f52f8327

  • SSDEEP

    192:K6tJDzFAip3VAREPFlL/NJN5MoiwH7abHG+jR9nsVVIOO7y6vC+2c:K6tJxp3fFlYoiwH7ab9sVKz7y6vC+2c

Malware Config

Extracted

Family

revengerat

Botnet

Slinky

C2

products-summit.gl.at.ply.gg:46540

Mutex

RV_MUTEX-DwUnoWrUUgHR

Signatures

  • RevengeRat Executable 1 IoCs
  • Revengerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections