General

  • Target

    91634dbbc3ac12dee468234cb1bab87e8875b940eae02c29e05611ec18e2cd16

  • Size

    99KB

  • Sample

    220307-m9rptsdfh8

  • MD5

    2a63d88b403e251d2587eb0fa5972356

  • SHA1

    d854b2e080cae641d50c09b5cc3e6bb2454c8ded

  • SHA256

    91634dbbc3ac12dee468234cb1bab87e8875b940eae02c29e05611ec18e2cd16

  • SHA512

    ffbcee55035f3c2c83e4d856c2a1badfc690e22cffdd14a4ead46990ee24baf96cda399ad6312e94d8ce0e05c00a91d2a25751370144f43743e6447fa54c21ce

Malware Config

Targets

    • Target

      91634dbbc3ac12dee468234cb1bab87e8875b940eae02c29e05611ec18e2cd16

    • Size

      99KB

    • MD5

      2a63d88b403e251d2587eb0fa5972356

    • SHA1

      d854b2e080cae641d50c09b5cc3e6bb2454c8ded

    • SHA256

      91634dbbc3ac12dee468234cb1bab87e8875b940eae02c29e05611ec18e2cd16

    • SHA512

      ffbcee55035f3c2c83e4d856c2a1badfc690e22cffdd14a4ead46990ee24baf96cda399ad6312e94d8ce0e05c00a91d2a25751370144f43743e6447fa54c21ce

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks