General

  • Target

    b3da01b83eb9ba4fc8a3fa2996dfbdc1bb185709b6998d72dd59490b1040d53b

  • Size

    7.5MB

  • Sample

    220309-q6vh4abfhj

  • MD5

    17808fde8c7e2d1a6f9cbdfd1c1c628c

  • SHA1

    1f30f5c18d6fe8322fd67d311043771fffc52c61

  • SHA256

    b3da01b83eb9ba4fc8a3fa2996dfbdc1bb185709b6998d72dd59490b1040d53b

  • SHA512

    637d20ad9914de591640e9e89b9099793cc40bb16e488587dd4f4b4a56c6171d268f1a55b0d889a5b83cf2fa369d5331afb2e46f7f6cea3ec4a680e123db8dcf

Malware Config

Targets

    • Target

      b3da01b83eb9ba4fc8a3fa2996dfbdc1bb185709b6998d72dd59490b1040d53b

    • Size

      7.5MB

    • MD5

      17808fde8c7e2d1a6f9cbdfd1c1c628c

    • SHA1

      1f30f5c18d6fe8322fd67d311043771fffc52c61

    • SHA256

      b3da01b83eb9ba4fc8a3fa2996dfbdc1bb185709b6998d72dd59490b1040d53b

    • SHA512

      637d20ad9914de591640e9e89b9099793cc40bb16e488587dd4f4b4a56c6171d268f1a55b0d889a5b83cf2fa369d5331afb2e46f7f6cea3ec4a680e123db8dcf

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks