General

  • Target

    gd4jPvuZ.exe

  • Size

    16KB

  • Sample

    201221-ksewct5npx

  • MD5

    b47b583fa4f107aa3c8b9b664e2a91ae

  • SHA1

    7d34f1adf91dc0ca2c98aa730aba7338f2a7f788

  • SHA256

    fb2f8e8647060c64bd4710d21511c25ba8065797672341649d674dc92e6ed6d3

  • SHA512

    0e1c0d29b01c2e7ecfb8eb568806fa6e02c87494b8690ccd2ea65c1b5a8b9a506127f7e7ab88413ead1f899b8849f42fa743afa6912982c7d3e9b56884ba9784

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

2.tcp.ngrok.io:12510

Mutex

RV_MUTEX

Targets

    • Target

      gd4jPvuZ.exe

    • Size

      16KB

    • MD5

      b47b583fa4f107aa3c8b9b664e2a91ae

    • SHA1

      7d34f1adf91dc0ca2c98aa730aba7338f2a7f788

    • SHA256

      fb2f8e8647060c64bd4710d21511c25ba8065797672341649d674dc92e6ed6d3

    • SHA512

      0e1c0d29b01c2e7ecfb8eb568806fa6e02c87494b8690ccd2ea65c1b5a8b9a506127f7e7ab88413ead1f899b8849f42fa743afa6912982c7d3e9b56884ba9784

    Score
    1/10

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks