General

  • Target

    e7855638115e51828aff2dde97a967409c118d1c7c883de968a35b06b61624b5

  • Size

    79KB

  • Sample

    220330-b27waseca4

  • MD5

    96a5e45ae95a2b95428c001d8a6bb7b1

  • SHA1

    40aa7869c871a2cab6a96264cca8dabe5a5aef96

  • SHA256

    e7855638115e51828aff2dde97a967409c118d1c7c883de968a35b06b61624b5

  • SHA512

    0e62c21b74771f7ea486c61d1e301641a346b3e929f68e98be8949d3e13734e2e0c06ac43a77dea319da9e51be6c89017c209936a19c61616b8e9ba057d2bffa

Malware Config

Targets

    • Target

      e7855638115e51828aff2dde97a967409c118d1c7c883de968a35b06b61624b5

    • Size

      79KB

    • MD5

      96a5e45ae95a2b95428c001d8a6bb7b1

    • SHA1

      40aa7869c871a2cab6a96264cca8dabe5a5aef96

    • SHA256

      e7855638115e51828aff2dde97a967409c118d1c7c883de968a35b06b61624b5

    • SHA512

      0e62c21b74771f7ea486c61d1e301641a346b3e929f68e98be8949d3e13734e2e0c06ac43a77dea319da9e51be6c89017c209936a19c61616b8e9ba057d2bffa

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Drops startup file

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks