General
-
Target
Client.exe
-
Size
52KB
-
MD5
5c3be327488c2c5d7dc69237d4ee38ba
-
SHA1
44e639b36b08d3b1f4cb72dc54c867b4c0370612
-
SHA256
41b9adcb74e30a400f092c1306b2dc24a46f48729348921953fc822f6d3405c2
-
SHA512
bfaa2fa68719b2d22068af5728e3829c0de073bf551f474c6cae8edbfd2de174e0db518056554fa407e4fb79a924f0018ec509e31d88ec52708f47ddbf8441be
-
SSDEEP
768:/9AthQUJ1eTO3SGbHYUj4pHMZTA3Q9g6qzZGKuUGf/O9Z3d5ojBty2T:qr1liGYUj41MZcg9C9GKEfWH3dKNt
Malware Config
Signatures
-
RevengeRat Executable 1 IoCs
resource yara_rule sample revengerat -
Revengerat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Client.exe
Files
-
Client.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 512B - Virtual size: 226B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ