MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3529b4f24984447fd6e5c67ed3c92ad4df89304c55504c3b944f63a8340f3148. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RevengeRAT


Vendor detections: 6


Intelligence 6 IOCs YARA 5 File information Comments

SHA256 hash: 3529b4f24984447fd6e5c67ed3c92ad4df89304c55504c3b944f63a8340f3148
SHA3-384 hash: 61485593fbca8bb397879f274244e3752694bb83c5ea654afdbbf0a23b91d4e74aa730b96505541d6eb05ce3e04fe0ec
SHA1 hash: 6fc24326f7cde649385de22607025ee0dd796e76
MD5 hash: b0b33b5e5ee9cf229260602bf7eeeb51
humanhash: paris-kansas-hamper-gee
File name:dd203194d0ea8460ac3173e861737a77fa684e5334503867e91a70acc7f73195.zip
Download: download sample
Signature RevengeRAT
File size:8'283 bytes
First seen:2023-10-05 05:58:08 UTC
Last seen:Never
File type: zip
MIME type:application/zip
Note:This file is a password protected archive. The password is: infected
ssdeep 192:+OtAqbuUWLRMks+MB3+ZdJIrP/NGP1hYNbQPMKQrU78gmU3OO:tt1hneJG3EP1cbQPp1iUeO
TLSH T1E302AFF665C33ACACBD5CDE047A527D2EE00909145BA6901B3DCCBA56FEC1E56F4C910
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter Anonymous
Tags:RevengeRAT zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
AU AU
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:dd203194d0ea8460ac3173e861737a77fa684e5334503867e91a70acc7f73195
File size:17'408 bytes
SHA256 hash: dd203194d0ea8460ac3173e861737a77fa684e5334503867e91a70acc7f73195
MD5 hash: 3efae209d698fc477f958bd0f9d0a9d3
MIME type:application/x-dosexec
Signature RevengeRAT
Vendor Threat Intelligence
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Malware family:
revengerat
Score:
  10/10
Tags:
family:revengerat botnet:airport stealer trojan
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops startup file
RevengeRat Executable
RevengeRAT
Malware Config
C2 Extraction:
69.87.219.76:4040
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RevengeRAT
Author:ditekSHen
Description:RevengeRAT and variants payload
Rule name:pe_imphash
Rule name:RevengeRAT_Sep17
Author:Florian Roth
Description:Detects RevengeRAT malware
Reference:Internal Research
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_revenge_rat_g2
Author:Slavo Greminger, SWITCH-CERT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments