File name: | Client.exe |
Full analysis: | https://app.any.run/tasks/f3421d6c-5825-4e34-ad3e-ac5892a71933 |
Verdict: | Malicious activity |
Threats: | Revenge was one of the most popular remote access trojans to be used in 2019 when it was featured in a huge malicious campaign named “Aggah”. This malware can take remote control of infected machines and spy after the victims. |
Analysis date: | December 05, 2022, 18:36:02 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | trojan rat revenge |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
MD5: | A4E5DE76B7C28032142E2C15EEFFC0F7 |
SHA1: | 44CEC041AA1F3722193A70A296304E4C8E9A442B |
SHA256: | 724068F536A07F3A2A0E53567CAC6FB83656922C6434E56744F584F72502D196 |
SSDEEP: | 384:snqOVwVA5rPJjPbLqfhbNsVO8NQjynWYE:UVwVA5rJLmND |
.exe | | | Generic CIL Executable (.NET, Mono, etc.) (63.1) |
.exe | | | Win64 Executable (generic) (23.8) |
.dll | | | Win32 Dynamic Link Library (generic) (5.6) |
.exe | | | Win32 Executable (generic) (3.8) |
.exe | | | Generic Win/DOS Executable (1.7) |
Architecture: | IMAGE_FILE_MACHINE_I386 |
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 2019-Nov-08 02:23:52 |
e_magic: | MZ |
e_cblp: | 144 |
e_cp: | 3 |
e_crlc: | 0 |
e_cparhdr: | 4 |
e_minalloc: | 0 |
e_maxalloc: | 65535 |
e_ss: | 0 |
e_sp: | 184 |
e_csum: | 0 |
e_ip: | 0 |
e_cs: | 0 |
e_ovno: | 0 |
e_oemid: | 0 |
e_oeminfo: | 0 |
e_lfanew: | 128 |
Signature: | PE |
Machine: | IMAGE_FILE_MACHINE_I386 |
NumberofSections: | 2 |
TimeDateStamp: | 2019-Nov-08 02:23:52 |
PointerToSymbolTable: | 0 |
NumberOfSymbols: | 0 |
SizeOfOptionalHeader: | 224 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 8192 | 18628 | 18944 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.53884 |
.reloc | 32768 | 12 | 512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.0815394 |
mscoree.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1756 | "C:\Users\admin\AppData\Local\Temp\Client.exe" | C:\Users\admin\AppData\Local\Temp\Client.exe | Explorer.EXE | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
|