General

  • Target

    43b48c044e4477eef46fc4238142651dceaba7679bb6cefc46f854b935475699

  • Size

    135KB

  • MD5

    65af74c275cbc256e4b2daaf3320cbe0

  • SHA1

    87ac028505bf1d71bdb5d8ba0bfc54d8b71ee778

  • SHA256

    43b48c044e4477eef46fc4238142651dceaba7679bb6cefc46f854b935475699

  • SHA512

    246e3aa21526ed509fb3fd103f7a193f360b6ea78393476ff771113386aaab55934e62d4af51317e9483fe52293ee5174329dcd5a8ea69cc71db92d5df8daf29

  • SSDEEP

    3072:U8u5cJ2bqpCWV7nDAln56xFn/SCHnIfAqU8zH3nJhVic:tu582Ulo8fxHIpFHZhUc

Malware Config

Extracted

Family

revengerat

Botnet

TrapNET

C2

44.33.44.33:333

Mutex

67REeserssee3

Signatures

  • RevengeRat Executable 8 IoCs
  • Revengerat family
  • Unsigned PE 8 IoCs

    Checks for missing Authenticode signature.

Files

  • 43b48c044e4477eef46fc4238142651dceaba7679bb6cefc46f854b935475699
    .zip
  • ClientHide.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ClientIL.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ClientObf.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ClientPress.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ClientPubType.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ClientRandName.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ClientString.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ClientTamp.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections