General

  • Target

    Client‮4PM..exe

  • Size

    16KB

  • MD5

    78546805aa20d09136de689620dc6ca2

  • SHA1

    3bfafdc380309d9ba9632d81ee220f063f6fe522

  • SHA256

    f52dd2dd58a66fb26ff986cd9bd6b033d0bca73800606ba4f6e6033fa44bf023

  • SHA512

    ef6210d14cec248d8361a5aa01f597853aad0305ebac68f51e00e73123e983a4bb502130a72e1a5fc910de1363a661caaa864f3f8ff06fd5d57728d9304f5ddc

  • SSDEEP

    384:KLGXnSVdX5/VBji1D9oDPlMNcLlb5sVKZyz5Ct:KLGXnSVdTBjyclMNE4o

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

Pizd11337-26540.portmap.host:26540

Mutex

RV_MUTEX

Signatures

  • RevengeRat Executable 1 IoCs
  • Revengerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client‮4PM..exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections