General

  • Target

    49c17404c6314b837c9f3b49aba9bf7e.hta

  • Size

    144KB

  • Sample

    220402-ebapnaecdp

  • MD5

    49c17404c6314b837c9f3b49aba9bf7e

  • SHA1

    dce337aa57cdf134e0c7a7101353777346e964e2

  • SHA256

    57d84d42d12c04652cf87f1b1255e0f6ada7674751200ba1d2298941deb5cd44

  • SHA512

    8018e8ad4f98cbea91218fd378c3f0a90ab172f6176a6d17016f2d23c1783250fa1467ee2f2023036dd8826816586d90f920f351929ca93d3e710feaf19cb268

Malware Config

Extracted

Family

revengerat

Botnet

MR_ahmed

C2

45.147.230.231:2222

Mutex

c416f58db13c4

Targets

    • Target

      49c17404c6314b837c9f3b49aba9bf7e.hta

    • Size

      144KB

    • MD5

      49c17404c6314b837c9f3b49aba9bf7e

    • SHA1

      dce337aa57cdf134e0c7a7101353777346e964e2

    • SHA256

      57d84d42d12c04652cf87f1b1255e0f6ada7674751200ba1d2298941deb5cd44

    • SHA512

      8018e8ad4f98cbea91218fd378c3f0a90ab172f6176a6d17016f2d23c1783250fa1467ee2f2023036dd8826816586d90f920f351929ca93d3e710feaf19cb268

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks