Behavioral task
behavioral1
Sample
cool.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cool.exe
Resource
win10v2004-20240802-en
General
-
Target
cool.exe
-
Size
23KB
-
MD5
4b61aedaee4e3be743dbebea96f91441
-
SHA1
448faae75b84b7dd9d66f1386f178935523a429c
-
SHA256
d650607092d56dd7df0b19c17e0ee5fb331af3aa03cd961e70e0a34310504a62
-
SHA512
1015e7d9476a8089d4ac5dcc0f2dc97154cbe7f05ae8990548fb23b4577cf863e11a6545df04dcca4995c7e74a6f916d55e442c8678885c1c742686688b65deb
-
SSDEEP
384:mb+cnNzGglTgMnmrBcNFEhmisbYpGy4AVFCzYcHe+Z:mbtucjs+AV8zYcHe+Z
Malware Config
Extracted
revengerat
Guest
127.0.0.1:1604
RV_MUTEX
Signatures
-
RevengeRat Executable 1 IoCs
resource yara_rule sample revengerat -
Revengerat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cool.exe
Files
-
cool.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ