Behavioral task
behavioral1
Sample
Android Emulator.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Android Emulator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Android Emulator.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
Android Emulator.exe
Resource
win11-20241007-en
General
-
Target
Android Emulator.exe
-
Size
180KB
-
MD5
9e55624e81cc5bf9f40792a97c5e3c9b
-
SHA1
35379afa47748f022e4f23d5a499ea01e251a88b
-
SHA256
88a0c5df4f8874254aedfe226c8e01756ac1ffc4d6e40360f70e42fc8fbe2b27
-
SHA512
bac780817e166dc8203f35bd34da289b583b1cb27c26dbe38c70beb44d669949ab666ed16e6485554a2aed22a987cb5e1c6a3cf7d36d85d952d8a28808190caf
-
SSDEEP
3072:a3ZN9Ho17ad7R3zWwSHaqXQpZjl9SYtT22wjiAAAAAAARtvNEEEZTEEEEEEEEE1G:a3FH+7A7R3zWPHa5Tjn7R22wOAAAAAAP
Malware Config
Extracted
revengerat
Guest
127.0.0.1:333
127.0.0.1:19472
2.tcp.eu.ngrok.io:333
2.tcp.eu.ngrok.io:19472
RV_MUTEX-RawrHJfWfhaRC
Signatures
-
RevengeRat Executable 1 IoCs
resource yara_rule sample revengerat -
Revengerat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Android Emulator.exe
Files
-
Android Emulator.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ