General

  • Target

    2de510b642dbdd2e18a6bc5331589d9328301e4a0147813a5f6b287800c1633c

  • Size

    437KB

  • Sample

    201109-xl2gze4v5n

  • MD5

    396548dc212d7e40b374e9a4722e5a0d

  • SHA1

    58c355b2ac580feda8166b3fd07de33bdb632c87

  • SHA256

    2de510b642dbdd2e18a6bc5331589d9328301e4a0147813a5f6b287800c1633c

  • SHA512

    6c5221c6484831dbf991ec2733961e0c9d210103de9de28e31d8566f2ccccc8044e369f96fc51797c6aa30b1f4625bf99e1884cd516e626679e067974a25e87d

Malware Config

Targets

    • Target

      2de510b642dbdd2e18a6bc5331589d9328301e4a0147813a5f6b287800c1633c

    • Size

      437KB

    • MD5

      396548dc212d7e40b374e9a4722e5a0d

    • SHA1

      58c355b2ac580feda8166b3fd07de33bdb632c87

    • SHA256

      2de510b642dbdd2e18a6bc5331589d9328301e4a0147813a5f6b287800c1633c

    • SHA512

      6c5221c6484831dbf991ec2733961e0c9d210103de9de28e31d8566f2ccccc8044e369f96fc51797c6aa30b1f4625bf99e1884cd516e626679e067974a25e87d

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks