General

  • Target

    30de81edb8646763d284c5f9a401a04a

  • Size

    73KB

  • Sample

    201117-t6k5jf434s

  • MD5

    30de81edb8646763d284c5f9a401a04a

  • SHA1

    1ef306a9fabb9b5e1ec3d4bcb122de49c5eaf105

  • SHA256

    7a3d37a6aa63c8cda5e1029a19644d5890d8dd723f370993abea447ddc936c68

  • SHA512

    022450d2c03a11a8a99d5d570f261bb8ea2432528bc0a6da1dac74b4a3f21abd4c30c4d5b19aee5e2be160b39999444206c6fa7717fa9fd757eaaaf67d28cc19

Malware Config

Targets

    • Target

      30de81edb8646763d284c5f9a401a04a

    • Size

      73KB

    • MD5

      30de81edb8646763d284c5f9a401a04a

    • SHA1

      1ef306a9fabb9b5e1ec3d4bcb122de49c5eaf105

    • SHA256

      7a3d37a6aa63c8cda5e1029a19644d5890d8dd723f370993abea447ddc936c68

    • SHA512

      022450d2c03a11a8a99d5d570f261bb8ea2432528bc0a6da1dac74b4a3f21abd4c30c4d5b19aee5e2be160b39999444206c6fa7717fa9fd757eaaaf67d28cc19

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks