General

  • Target

    13efa382b10defb99bd1415a12ab885da5ba6773bd651f2a983239bf10bcd5c4

  • Size

    151KB

  • Sample

    220219-kzcf2sbbel

  • MD5

    2617fabde3d4865c6838626ff1f08dd4

  • SHA1

    1b30dd98a97c25f898b9a90765b9da65e5f59a85

  • SHA256

    13efa382b10defb99bd1415a12ab885da5ba6773bd651f2a983239bf10bcd5c4

  • SHA512

    10e525b6fd13fc268e4eecad4abe1ee5d81fb0ebba701c522b6ff2485954477ccdb9810ceb06d51183469f3e5f5e0af8935d20156e25d601d14e371d040af8b8

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

h0pe1759.ddns.net:6943

Mutex

128f3f5311064da68d3

Targets

    • Target

      13efa382b10defb99bd1415a12ab885da5ba6773bd651f2a983239bf10bcd5c4

    • Size

      151KB

    • MD5

      2617fabde3d4865c6838626ff1f08dd4

    • SHA1

      1b30dd98a97c25f898b9a90765b9da65e5f59a85

    • SHA256

      13efa382b10defb99bd1415a12ab885da5ba6773bd651f2a983239bf10bcd5c4

    • SHA512

      10e525b6fd13fc268e4eecad4abe1ee5d81fb0ebba701c522b6ff2485954477ccdb9810ceb06d51183469f3e5f5e0af8935d20156e25d601d14e371d040af8b8

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks