General

  • Target

    cool.exe

  • Size

    23KB

  • MD5

    4b61aedaee4e3be743dbebea96f91441

  • SHA1

    448faae75b84b7dd9d66f1386f178935523a429c

  • SHA256

    d650607092d56dd7df0b19c17e0ee5fb331af3aa03cd961e70e0a34310504a62

  • SHA512

    1015e7d9476a8089d4ac5dcc0f2dc97154cbe7f05ae8990548fb23b4577cf863e11a6545df04dcca4995c7e74a6f916d55e442c8678885c1c742686688b65deb

  • SSDEEP

    384:mb+cnNzGglTgMnmrBcNFEhmisbYpGy4AVFCzYcHe+Z:mbtucjs+AV8zYcHe+Z

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

127.0.0.1:1604

Mutex

RV_MUTEX

Signatures

  • RevengeRat Executable 1 IoCs
  • Revengerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • cool.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections