General

  • Target

    9e70c5b4e6bbfaa1f7d410b0d79aae92c23a88ce32f7b6e651bfcfeece407bf7

  • Size

    45KB

  • Sample

    220219-kz463abbeq

  • MD5

    3466fd80a243ae5b2e2581214b49d0be

  • SHA1

    a68eb0b7f56bc5459502f83ffa55e6a783b78797

  • SHA256

    9e70c5b4e6bbfaa1f7d410b0d79aae92c23a88ce32f7b6e651bfcfeece407bf7

  • SHA512

    ca3bce0228d8ad34e90ed49207bbc3e4f906281167bf20f02e9f7aa0fe8054741578d0d98132e70417913ffc2caff4f5f710f76acd351981c6c5a4dac74ad720

Malware Config

Extracted

Family

revengerat

Botnet

Client

C2

kimjoy.ddns.net:2021

Mutex

RXQLV8XYTDNHNSA

Targets

    • Target

      9e70c5b4e6bbfaa1f7d410b0d79aae92c23a88ce32f7b6e651bfcfeece407bf7

    • Size

      45KB

    • MD5

      3466fd80a243ae5b2e2581214b49d0be

    • SHA1

      a68eb0b7f56bc5459502f83ffa55e6a783b78797

    • SHA256

      9e70c5b4e6bbfaa1f7d410b0d79aae92c23a88ce32f7b6e651bfcfeece407bf7

    • SHA512

      ca3bce0228d8ad34e90ed49207bbc3e4f906281167bf20f02e9f7aa0fe8054741578d0d98132e70417913ffc2caff4f5f710f76acd351981c6c5a4dac74ad720

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks