General

  • Target

    b53e495500f628e4914ce71fcd5dfa5413a62220671e5fdf93377a08f057e951

  • Size

    66KB

  • Sample

    220215-15qhvsagc8

  • MD5

    a9a46a523993add1117a618d0d5d395b

  • SHA1

    5bb538557bbbe2ccc3f2dabbffe4cd25088cde6b

  • SHA256

    b53e495500f628e4914ce71fcd5dfa5413a62220671e5fdf93377a08f057e951

  • SHA512

    10b2b1d3e48c4fe089e9fd664ad49afe38ea11081bebf669854b2087a79de0147da8faaf420f26818c31a2a843d603cefe59c886706bbed5a8d0ecfc5de6b7ce

Malware Config

Targets

    • Target

      b53e495500f628e4914ce71fcd5dfa5413a62220671e5fdf93377a08f057e951

    • Size

      66KB

    • MD5

      a9a46a523993add1117a618d0d5d395b

    • SHA1

      5bb538557bbbe2ccc3f2dabbffe4cd25088cde6b

    • SHA256

      b53e495500f628e4914ce71fcd5dfa5413a62220671e5fdf93377a08f057e951

    • SHA512

      10b2b1d3e48c4fe089e9fd664ad49afe38ea11081bebf669854b2087a79de0147da8faaf420f26818c31a2a843d603cefe59c886706bbed5a8d0ecfc5de6b7ce

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Tasks