General

  • Target

    36e41f411caa8c2bcdb0d95ef65363f6a5c3aece45d1b2ff476a7d806b779386

  • Size

    1022KB

  • Sample

    210517-qmkzb978hn

  • MD5

    000df32a4515aeedb77f7e2968c4d7b9

  • SHA1

    715e7348aba3664c789f6375b728373ec1c185aa

  • SHA256

    36e41f411caa8c2bcdb0d95ef65363f6a5c3aece45d1b2ff476a7d806b779386

  • SHA512

    74e07b60d942f8907b66e6eb74e1984e05111c87db085bfae5df02dea94bc409de82df54bb1b4cab7313cc052a614331c067f0852c5cbdee581fb21bdd3f578e

Malware Config

Extracted

Family

revengerat

Botnet

ENE20

C2

rever2019.duckdns.org:4230

Mutex

RV_MUTEX-GaKuSAtYBxGgZ

Targets

    • Target

      36e41f411caa8c2bcdb0d95ef65363f6a5c3aece45d1b2ff476a7d806b779386

    • Size

      1022KB

    • MD5

      000df32a4515aeedb77f7e2968c4d7b9

    • SHA1

      715e7348aba3664c789f6375b728373ec1c185aa

    • SHA256

      36e41f411caa8c2bcdb0d95ef65363f6a5c3aece45d1b2ff476a7d806b779386

    • SHA512

      74e07b60d942f8907b66e6eb74e1984e05111c87db085bfae5df02dea94bc409de82df54bb1b4cab7313cc052a614331c067f0852c5cbdee581fb21bdd3f578e

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks