Behavioral task
behavioral1
Sample
Revenge.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
Revenge.exe
-
Size
20KB
-
MD5
8ce9e623e44cdb2dbd292da43a90506f
-
SHA1
09c00d2c83c5456ae168b8329a63befacaef004e
-
SHA256
da1e65953f6cf5b06dc9c4e0f596d5c9997c2ec32aeb41e875816f10c74cb049
-
SHA512
792e0cb35c0d4dd87a5f21d9ea7b154139676497373717150bfb629669bc59c799f8f8bbdeb763eab696e0cb85e94744af4c77441eaa7a6283511ef0654331f3
-
SSDEEP
384:AX2yy5E7X152gLDQqb7sVKuBV1yhKr2534WCzYcHe+Z:Q2yy5Gl52uDp42h4XzYcHe+Z
Malware Config
Extracted
revengerat
Guest
necatisoff-36486.portmap.host:36486
RV_MUTEX-ETUKIWwiejYAo
Signatures
-
RevengeRat Executable 1 IoCs
resource yara_rule sample revengerat -
Revengerat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Revenge.exe
Files
-
Revenge.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ