General

  • Target

    Client2‮COD..exe

  • Size

    467KB

  • MD5

    69c5d667bdb0c221dbb50d3301ad1d67

  • SHA1

    c9fb83fc1cc21052a51c1e38bdaaf8b2c3653293

  • SHA256

    07af92f0d7debf7f977de61ae735a80a8c504620c61060953c963545e72d1c8d

  • SHA512

    221de0fe425d9691feb2b065e9cb02a5fad2e15b92829900a77c3728bc03ce2c329792e15dbb73378cb838c09479998f243cc7fe68bfa5abe653733fb5243798

  • SSDEEP

    3072:zV3sMJibhTsNElLD5CbwDMV9SYzAwZd7uy6W:zV30hTsNElLDzDy78w/am

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

127.0.0.1:1604

Mutex

RV_MUTEX

Signatures

  • RevengeRat Executable 1 IoCs
  • Revengerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client2‮COD..exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections