General

  • Target

    af4bb34b486434d235ff70d344e3fa4e6d56a83705e1cc288efe219edceded06

  • Size

    162KB

  • Sample

    220219-k2vemsbbhj

  • MD5

    c3c90a58ff247a052529de56f29ecf3c

  • SHA1

    aa62c39357984dfa208c1ff7a0b76dc200c37b4d

  • SHA256

    af4bb34b486434d235ff70d344e3fa4e6d56a83705e1cc288efe219edceded06

  • SHA512

    6427d3abddaf44ce8d11fe686cfdf3d0fddfe9c910da406416da646aaf172d4514dbbd1419b8c2ea6fce13c538beee22b8c46adb6a4360c4d3626ba65f9d02f3

Malware Config

Extracted

Family

revengerat

Botnet

Client

C2

kimjoy.ddns.net:6699

Mutex

S1NTYL5X286LOEH

Targets

    • Target

      af4bb34b486434d235ff70d344e3fa4e6d56a83705e1cc288efe219edceded06

    • Size

      162KB

    • MD5

      c3c90a58ff247a052529de56f29ecf3c

    • SHA1

      aa62c39357984dfa208c1ff7a0b76dc200c37b4d

    • SHA256

      af4bb34b486434d235ff70d344e3fa4e6d56a83705e1cc288efe219edceded06

    • SHA512

      6427d3abddaf44ce8d11fe686cfdf3d0fddfe9c910da406416da646aaf172d4514dbbd1419b8c2ea6fce13c538beee22b8c46adb6a4360c4d3626ba65f9d02f3

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks