General

  • Target

    bbd3ecd9e9671d94e8897980c4eb9391ae9cb444615ed9a93b8221ae8fa66790

  • Size

    102KB

  • Sample

    220201-etlvmsgebl

  • MD5

    f6eec1317ece3ffb7c4916e224d9734d

  • SHA1

    a3447ba9b83f30284c6d3effb45c31ad9d5f258f

  • SHA256

    bbd3ecd9e9671d94e8897980c4eb9391ae9cb444615ed9a93b8221ae8fa66790

  • SHA512

    36f13789fb55fc017c7cdbfe2eb3d8993fba913986f772a9ca096686256a10f4011a4af6b6187c2b45873d1e5fc00a993b1e5f9571a9609d967ad7be57e778d2

Malware Config

Extracted

Family

revengerat

Botnet

system

C2

47.100.84.12:55656

Mutex

RV_MUTEX-QZblRvZwfRtNH

Targets

    • Target

      bbd3ecd9e9671d94e8897980c4eb9391ae9cb444615ed9a93b8221ae8fa66790

    • Size

      102KB

    • MD5

      f6eec1317ece3ffb7c4916e224d9734d

    • SHA1

      a3447ba9b83f30284c6d3effb45c31ad9d5f258f

    • SHA256

      bbd3ecd9e9671d94e8897980c4eb9391ae9cb444615ed9a93b8221ae8fa66790

    • SHA512

      36f13789fb55fc017c7cdbfe2eb3d8993fba913986f772a9ca096686256a10f4011a4af6b6187c2b45873d1e5fc00a993b1e5f9571a9609d967ad7be57e778d2

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Sets service image path in registry

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks