General

  • Target

    4360d18385c208ec23f8a4417b88ccbfd30233524b413e4d09bc9f6844846011

  • Size

    36KB

  • Sample

    201109-83ayplvtpe

  • MD5

    a6d0189ee708bc23e8c65201f22ef375

  • SHA1

    18adbd27cea8040418b9a7664b21e801fc44d3be

  • SHA256

    4360d18385c208ec23f8a4417b88ccbfd30233524b413e4d09bc9f6844846011

  • SHA512

    ed6f5e890c16edb01ecc167e645760ab9185f4a1f07443951a741d2aa1c87dbb35144a9ca902a7b369d1c38d401ffad1b88ce4f9cac60efdd11efcd9c369e986

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

0.tcp.eu.ngrok.io:18622

Mutex

RV_MUTEX

Targets

    • Target

      4360d18385c208ec23f8a4417b88ccbfd30233524b413e4d09bc9f6844846011

    • Size

      36KB

    • MD5

      a6d0189ee708bc23e8c65201f22ef375

    • SHA1

      18adbd27cea8040418b9a7664b21e801fc44d3be

    • SHA256

      4360d18385c208ec23f8a4417b88ccbfd30233524b413e4d09bc9f6844846011

    • SHA512

      ed6f5e890c16edb01ecc167e645760ab9185f4a1f07443951a741d2aa1c87dbb35144a9ca902a7b369d1c38d401ffad1b88ce4f9cac60efdd11efcd9c369e986

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks