General

  • Target

    e5223d2f96963acd0f798655baadb74bb1260b1342e2839bceadc0daba6c5f78

  • Size

    1.1MB

  • Sample

    201112-n1xp2ynghj

  • MD5

    3f6c9f05bf208a082ffbc1786347abd7

  • SHA1

    472dcc8685cd8ec76f47ba91f87f2bbb8852721e

  • SHA256

    e5223d2f96963acd0f798655baadb74bb1260b1342e2839bceadc0daba6c5f78

  • SHA512

    f81f639267e54d82821e5dbcd60f666a2b524f81135fac77f76922148109b14ae8b0623ba06ea7c4a978187f9e3fe0a9652ee61f42e44976d5db96bb7975480f

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

178.17.174.71:3310

Mutex

RV_MUTEX-HxdYuaWVCGnhp

Targets

    • Target

      e5223d2f96963acd0f798655baadb74bb1260b1342e2839bceadc0daba6c5f78

    • Size

      1.1MB

    • MD5

      3f6c9f05bf208a082ffbc1786347abd7

    • SHA1

      472dcc8685cd8ec76f47ba91f87f2bbb8852721e

    • SHA256

      e5223d2f96963acd0f798655baadb74bb1260b1342e2839bceadc0daba6c5f78

    • SHA512

      f81f639267e54d82821e5dbcd60f666a2b524f81135fac77f76922148109b14ae8b0623ba06ea7c4a978187f9e3fe0a9652ee61f42e44976d5db96bb7975480f

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks