General

  • Target

    5e94b03664c3674f3eab1e750ffde61d3d21d938ec0ce21f6f64bc9362aeb084

  • Size

    263KB

  • Sample

    220201-gy1wgahhdl

  • MD5

    53d4d4cc977362c09fd466bb676567c8

  • SHA1

    721ca63682c4a34c86585f80eceead43f20e10f3

  • SHA256

    5e94b03664c3674f3eab1e750ffde61d3d21d938ec0ce21f6f64bc9362aeb084

  • SHA512

    e9ab6bb64ad9c576e9eb66331ef4546d54d1cf31f5250e87683f1a887bda5acf09ed39707eef89e6135ffc8b41da451e59d590da325dcd23e9a16af338475df1

Malware Config

Targets

    • Target

      5e94b03664c3674f3eab1e750ffde61d3d21d938ec0ce21f6f64bc9362aeb084

    • Size

      263KB

    • MD5

      53d4d4cc977362c09fd466bb676567c8

    • SHA1

      721ca63682c4a34c86585f80eceead43f20e10f3

    • SHA256

      5e94b03664c3674f3eab1e750ffde61d3d21d938ec0ce21f6f64bc9362aeb084

    • SHA512

      e9ab6bb64ad9c576e9eb66331ef4546d54d1cf31f5250e87683f1a887bda5acf09ed39707eef89e6135ffc8b41da451e59d590da325dcd23e9a16af338475df1

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Sets service image path in registry

    • Drops startup file

MITRE ATT&CK Enterprise v6

Tasks