General

  • Target

    egne‮GPJ..exe

  • Size

    20KB

  • Sample

    201120-xwfz38eedx

  • MD5

    c9bc80980cd6b0deaf7d24a0d6c479a8

  • SHA1

    7cd003e70561acd1d7792fec9a76ed44d2ffd3e6

  • SHA256

    5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924

  • SHA512

    7fcd2a7c1a62ddcca3e0e7c05fcfb715009e404d822f3da03c732b6b432cb4c5e5c3248e81259f1eadebbf080dd07c20d9e2add47e0ee2e1d7b42fcbcdaa0484

Malware Config

Extracted

Family

revengerat

Botnet

Client

C2

127.0.0.1:333

127.0.0.1:37337

Mutex

RV_MUTEX

Targets

    • Target

      egne‮GPJ..exe

    • Size

      20KB

    • MD5

      c9bc80980cd6b0deaf7d24a0d6c479a8

    • SHA1

      7cd003e70561acd1d7792fec9a76ed44d2ffd3e6

    • SHA256

      5792e1610df899d8fb7564e6fdf5cc5b8cf13162bd17c88b3351009c738d6924

    • SHA512

      7fcd2a7c1a62ddcca3e0e7c05fcfb715009e404d822f3da03c732b6b432cb4c5e5c3248e81259f1eadebbf080dd07c20d9e2add47e0ee2e1d7b42fcbcdaa0484

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks