General

  • Target

    5211a46ac100bb4e5bbf98c0e2ee7b373df6d90090936a003e6c843313bb9655

  • Size

    54KB

  • Sample

    220415-bb1djaaec9

  • MD5

    3bcbc6677190cc3222409e1ebc17fd94

  • SHA1

    d214dfe5cc5aa2ac3400d9ae2c77ae0186f0e60e

  • SHA256

    5211a46ac100bb4e5bbf98c0e2ee7b373df6d90090936a003e6c843313bb9655

  • SHA512

    13b609b13dadc6a423313ed958041534d4cb6ca28fb3011ed76cdd006835cecbaac55c7af048b361400b90a157182d5914d1fc0f4c39a526f21c2e0bea3b5974

Malware Config

Extracted

Family

revengerat

Botnet

DP

C2

akkaibalol-31403.portmap.host:31403

Mutex

RV_MUTEX-flgZblRvZwfRtN

Targets

    • Target

      5211a46ac100bb4e5bbf98c0e2ee7b373df6d90090936a003e6c843313bb9655

    • Size

      54KB

    • MD5

      3bcbc6677190cc3222409e1ebc17fd94

    • SHA1

      d214dfe5cc5aa2ac3400d9ae2c77ae0186f0e60e

    • SHA256

      5211a46ac100bb4e5bbf98c0e2ee7b373df6d90090936a003e6c843313bb9655

    • SHA512

      13b609b13dadc6a423313ed958041534d4cb6ca28fb3011ed76cdd006835cecbaac55c7af048b361400b90a157182d5914d1fc0f4c39a526f21c2e0bea3b5974

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks