General

  • Target

    e167b20f1acf48f7ce0ae33a218e2c1b300b41c012ededf03e7a3522a4ebe95e

  • Size

    142KB

  • Sample

    220201-dy59eagee3

  • MD5

    7338b335ad5471cb67658f27836374f0

  • SHA1

    eb0e81598d8526d88cac4695a3e9360cc8fbb331

  • SHA256

    e167b20f1acf48f7ce0ae33a218e2c1b300b41c012ededf03e7a3522a4ebe95e

  • SHA512

    1abaf8f72d10eaa5a77dabaeb20d922228c09c3da9756a09a63b7dc77cc9e866b3d47aad17bf2ae2846458964af6c028975c5631116a677a80ff317769ccf2f7

Malware Config

Targets

    • Target

      e167b20f1acf48f7ce0ae33a218e2c1b300b41c012ededf03e7a3522a4ebe95e

    • Size

      142KB

    • MD5

      7338b335ad5471cb67658f27836374f0

    • SHA1

      eb0e81598d8526d88cac4695a3e9360cc8fbb331

    • SHA256

      e167b20f1acf48f7ce0ae33a218e2c1b300b41c012ededf03e7a3522a4ebe95e

    • SHA512

      1abaf8f72d10eaa5a77dabaeb20d922228c09c3da9756a09a63b7dc77cc9e866b3d47aad17bf2ae2846458964af6c028975c5631116a677a80ff317769ccf2f7

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Sets service image path in registry

    • Drops startup file

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks