General

  • Target

    111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd

  • Size

    99KB

  • Sample

    220307-m97q2sdga4

  • MD5

    36f59c964d963935ae77621ca6e57a41

  • SHA1

    a81fba0cedfba66d84ffe2d2fd0b3803b099cbfc

  • SHA256

    111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd

  • SHA512

    b7518ef642eb62c836ba8ea4256d815c877490b1e68906c2f099f7f484380eba22e6cbec6bcb61af4611f52218306993a356017f0c196fada2d6380f2bcd4c63

Malware Config

Targets

    • Target

      111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd

    • Size

      99KB

    • MD5

      36f59c964d963935ae77621ca6e57a41

    • SHA1

      a81fba0cedfba66d84ffe2d2fd0b3803b099cbfc

    • SHA256

      111d60990d8aaadbfcc5585ff56d7ed8d597978e1069b06a206ca0552b2150dd

    • SHA512

      b7518ef642eb62c836ba8ea4256d815c877490b1e68906c2f099f7f484380eba22e6cbec6bcb61af4611f52218306993a356017f0c196fada2d6380f2bcd4c63

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks