General

  • Target

    9c3c91edfaefea76fb34eddc89c356e32e0adf3d64ea020f61741020293d9b5b

  • Size

    23KB

  • Sample

    220201-fjz5ysghfr

  • MD5

    0e59414b319810c1c0a50a65461ee1f7

  • SHA1

    3f3912c6427ae1a084c59582e7150bbf7006fd8f

  • SHA256

    9c3c91edfaefea76fb34eddc89c356e32e0adf3d64ea020f61741020293d9b5b

  • SHA512

    c04e0c28ba20cdeaabd9438faae4ffbc5d219f9f5e2c43fd29fc3a2319f52df111c30b02272766ee67ff7fda9844f0de97b5ef76c1a919c763dfaad18ee4ce3c

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

dqrkodz34.ddns.net:5552

Mutex

RV_MUTEX-DxjEexVoqqNL

Targets

    • Target

      9c3c91edfaefea76fb34eddc89c356e32e0adf3d64ea020f61741020293d9b5b

    • Size

      23KB

    • MD5

      0e59414b319810c1c0a50a65461ee1f7

    • SHA1

      3f3912c6427ae1a084c59582e7150bbf7006fd8f

    • SHA256

      9c3c91edfaefea76fb34eddc89c356e32e0adf3d64ea020f61741020293d9b5b

    • SHA512

      c04e0c28ba20cdeaabd9438faae4ffbc5d219f9f5e2c43fd29fc3a2319f52df111c30b02272766ee67ff7fda9844f0de97b5ef76c1a919c763dfaad18ee4ce3c

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Sets service image path in registry

    • Drops startup file

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks