General

  • Target

    721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61

  • Size

    42KB

  • Sample

    220219-ky2dsabbdr

  • MD5

    2bd198d265d67c9f4021eca5bb341900

  • SHA1

    e3559a0d69e988877ce69d66b69cb41619521272

  • SHA256

    721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61

  • SHA512

    fa00e4b59b41ccbe865d342815001262323db96f99ebd30b1a5728111f9959c2e2775a5f279652649505ad23afe7a5551a705c650b985829cd2690f92f50e8f4

Malware Config

Extracted

Family

revengerat

Botnet

Client

C2

kimjoy.ddns.net:2021

Mutex

RXQLV8XYTDNHNSA

Targets

    • Target

      721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61

    • Size

      42KB

    • MD5

      2bd198d265d67c9f4021eca5bb341900

    • SHA1

      e3559a0d69e988877ce69d66b69cb41619521272

    • SHA256

      721e44289afb034e90a67fb97eb5efd4d469bc95ba9863f16aed5e5909c76c61

    • SHA512

      fa00e4b59b41ccbe865d342815001262323db96f99ebd30b1a5728111f9959c2e2775a5f279652649505ad23afe7a5551a705c650b985829cd2690f92f50e8f4

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks