Behavioral task
behavioral1
Sample
03e6043a9dc35b10400bd0e81a62977b05e7ecf941524673bdcdcae9e012cb07.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03e6043a9dc35b10400bd0e81a62977b05e7ecf941524673bdcdcae9e012cb07.exe
Resource
win10v2004-20240802-en
General
-
Target
03e6043a9dc35b10400bd0e81a62977b05e7ecf941524673bdcdcae9e012cb07.exe
-
Size
16KB
-
MD5
34ac5ff36b6e50f208c64ac1dbb70c9b
-
SHA1
b3e475810f772a54b6a0d44356e62e015b6abb54
-
SHA256
03e6043a9dc35b10400bd0e81a62977b05e7ecf941524673bdcdcae9e012cb07
-
SHA512
1c286755d64fd72ead82799d52665c743b2caf57611a605f335c12997b7fedbe81ca55d1505fb7108900b578b638a0c1201255d014f19b17deae396800d2a3ee
-
SSDEEP
384:8A75Uhy19HJSQXz9oDPlMNcLlb5sVKuys5Ct:8A75Uhy19gWclMNEyo
Malware Config
Extracted
revengerat
Guest
127.0.0.1:2302
RV_MUTEX
Signatures
-
RevengeRat Executable 1 IoCs
resource yara_rule sample revengerat -
Revengerat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03e6043a9dc35b10400bd0e81a62977b05e7ecf941524673bdcdcae9e012cb07.exe
Files
-
03e6043a9dc35b10400bd0e81a62977b05e7ecf941524673bdcdcae9e012cb07.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ