General

  • Target

    Android Emulator.exe

  • Size

    180KB

  • MD5

    9e55624e81cc5bf9f40792a97c5e3c9b

  • SHA1

    35379afa47748f022e4f23d5a499ea01e251a88b

  • SHA256

    88a0c5df4f8874254aedfe226c8e01756ac1ffc4d6e40360f70e42fc8fbe2b27

  • SHA512

    bac780817e166dc8203f35bd34da289b583b1cb27c26dbe38c70beb44d669949ab666ed16e6485554a2aed22a987cb5e1c6a3cf7d36d85d952d8a28808190caf

  • SSDEEP

    3072:a3ZN9Ho17ad7R3zWwSHaqXQpZjl9SYtT22wjiAAAAAAARtvNEEEZTEEEEEEEEE1G:a3FH+7A7R3zWPHa5Tjn7R22wOAAAAAAP

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

127.0.0.1:333

127.0.0.1:19472

2.tcp.eu.ngrok.io:333

2.tcp.eu.ngrok.io:19472

Mutex

RV_MUTEX-RawrHJfWfhaRC

Signatures

  • RevengeRat Executable 1 IoCs
  • Revengerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Android Emulator.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections