General

  • Target

    d6e2d8bdf8569095507bd659188149580bf33e44693edd308905f68ddba3253e

  • Size

    138KB

  • Sample

    201111-sxw5ax72p2

  • MD5

    d3edab665c966aefa822e49154387b54

  • SHA1

    cd05ec3580df1480bc4ae28a3f1dc6027a123950

  • SHA256

    d6e2d8bdf8569095507bd659188149580bf33e44693edd308905f68ddba3253e

  • SHA512

    ffa0a25b8654f22dfccc3742c35535aea0eabf9464849f520738a6eca3d1a94276da4145e3629ef617c2c6b753ebe2d1df81a744ca32875365def01d7c6f620e

Malware Config

Targets

    • Target

      d6e2d8bdf8569095507bd659188149580bf33e44693edd308905f68ddba3253e

    • Size

      138KB

    • MD5

      d3edab665c966aefa822e49154387b54

    • SHA1

      cd05ec3580df1480bc4ae28a3f1dc6027a123950

    • SHA256

      d6e2d8bdf8569095507bd659188149580bf33e44693edd308905f68ddba3253e

    • SHA512

      ffa0a25b8654f22dfccc3742c35535aea0eabf9464849f520738a6eca3d1a94276da4145e3629ef617c2c6b753ebe2d1df81a744ca32875365def01d7c6f620e

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks