General

  • Target

    620b8057f975eb2475b9a5a0756f21d4b866acc1f02c418ee3d994b74ee6bb77

  • Size

    107KB

  • Sample

    220219-k2k6zabbgn

  • MD5

    0572b2985ec70a37642e6a5513a098c2

  • SHA1

    686116cf6308871a8c7e79e2d305093e04a60476

  • SHA256

    620b8057f975eb2475b9a5a0756f21d4b866acc1f02c418ee3d994b74ee6bb77

  • SHA512

    43b58d5bdebae446bca36b9a08a3e71d7ffb8f05beb2a05e26d74bf1093f73171e33cf645a1379ce88e766227c5e4b103567e81594288a9664745bc6a39522b6

Malware Config

Extracted

Family

revengerat

Botnet

Anjola

C2

bodmas01.zapto.org:6969

Mutex

RV_MUTEX-evTTgZNUUPRaw

Targets

    • Target

      620b8057f975eb2475b9a5a0756f21d4b866acc1f02c418ee3d994b74ee6bb77

    • Size

      107KB

    • MD5

      0572b2985ec70a37642e6a5513a098c2

    • SHA1

      686116cf6308871a8c7e79e2d305093e04a60476

    • SHA256

      620b8057f975eb2475b9a5a0756f21d4b866acc1f02c418ee3d994b74ee6bb77

    • SHA512

      43b58d5bdebae446bca36b9a08a3e71d7ffb8f05beb2a05e26d74bf1093f73171e33cf645a1379ce88e766227c5e4b103567e81594288a9664745bc6a39522b6

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks