General

  • Target

    e6eda9918b257e317e921d294b903f9488929fe7ef2efc0955bd141d19e15855

  • Size

    17KB

  • Sample

    220201-dnjmnafgfl

  • MD5

    64c4cdba4768bc1ad90f0061037d4328

  • SHA1

    411b304ae5aac0e7fe27bd17b8c50f081bca3654

  • SHA256

    e6eda9918b257e317e921d294b903f9488929fe7ef2efc0955bd141d19e15855

  • SHA512

    591c8a5613c7888199adf80bce31141a77a0ce9cb260d96a5dd8d40dfd764ebaa9846fa9020cee19c2766685cbbf7d28c57007888076bb03c0dcaec83ad60f50

Malware Config

Extracted

Family

revengerat

Botnet

2SP Force DZ

C2

imaneblueyesvpn.ddns.net:333

Mutex

RV_MUTEX-jpnFwUnoWrUUg

Targets

    • Target

      e6eda9918b257e317e921d294b903f9488929fe7ef2efc0955bd141d19e15855

    • Size

      17KB

    • MD5

      64c4cdba4768bc1ad90f0061037d4328

    • SHA1

      411b304ae5aac0e7fe27bd17b8c50f081bca3654

    • SHA256

      e6eda9918b257e317e921d294b903f9488929fe7ef2efc0955bd141d19e15855

    • SHA512

      591c8a5613c7888199adf80bce31141a77a0ce9cb260d96a5dd8d40dfd764ebaa9846fa9020cee19c2766685cbbf7d28c57007888076bb03c0dcaec83ad60f50

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Sets service image path in registry

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks