General

  • Target

    cb0c2b0db1de4845fafdd4b8e2a1ef398bdee18377216d1d0f447106bea4ef6a

  • Size

    1.1MB

  • Sample

    201111-6mcs1bb2la

  • MD5

    588328b4886f345e3b63d5eac584a7b9

  • SHA1

    fd67734dd216f04779a41a3661f9ddfee1f3b588

  • SHA256

    cb0c2b0db1de4845fafdd4b8e2a1ef398bdee18377216d1d0f447106bea4ef6a

  • SHA512

    7fe047092033ae7556e532bac4b54932578680feb168ab11842c4614842f1d1cce134b3e78727f8ef152c469fec22f2b26a50f53bfb314c57064288ec50a1b77

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

178.17.174.71:3310

Mutex

RV_MUTEX-HxdYuaWVCGnhp

Targets

    • Target

      cb0c2b0db1de4845fafdd4b8e2a1ef398bdee18377216d1d0f447106bea4ef6a

    • Size

      1.1MB

    • MD5

      588328b4886f345e3b63d5eac584a7b9

    • SHA1

      fd67734dd216f04779a41a3661f9ddfee1f3b588

    • SHA256

      cb0c2b0db1de4845fafdd4b8e2a1ef398bdee18377216d1d0f447106bea4ef6a

    • SHA512

      7fe047092033ae7556e532bac4b54932578680feb168ab11842c4614842f1d1cce134b3e78727f8ef152c469fec22f2b26a50f53bfb314c57064288ec50a1b77

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks