General

  • Target

    file

  • Size

    17KB

  • Sample

    201109-93z22n6l42

  • MD5

    af48897e401a79baf8086585c18cf8fe

  • SHA1

    44e9a2699d07cbba45493000287ab5dfbe86df77

  • SHA256

    acec05fb087440c24b6ac8a15051b8fc7fdfd92bdf458b165e1e19265395b595

  • SHA512

    c65d348d3225e86909e33e9ef9717be72ea7f934b673f82748907f927c459c39e739dcb3ebcfc029b3fdd81d7a528cd2a025d01b28ded04a604a6375b13b8ea1

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

tzii.myq-see.com:888

Mutex

RV_MUTEX-IUnoWrUUgHRHXJv

Targets

    • Target

      file

    • Size

      17KB

    • MD5

      af48897e401a79baf8086585c18cf8fe

    • SHA1

      44e9a2699d07cbba45493000287ab5dfbe86df77

    • SHA256

      acec05fb087440c24b6ac8a15051b8fc7fdfd92bdf458b165e1e19265395b595

    • SHA512

      c65d348d3225e86909e33e9ef9717be72ea7f934b673f82748907f927c459c39e739dcb3ebcfc029b3fdd81d7a528cd2a025d01b28ded04a604a6375b13b8ea1

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Drops startup file

    • Uses the VBS compiler for execution

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks