General

  • Target

    FA57F7CBA4406D815947A3A2481842F6B0E1C6D82CB3E.exe

  • Size

    1.2MB

  • Sample

    220416-2zz1sabcb8

  • MD5

    c254954614087279f57a4ccf72b0f17e

  • SHA1

    c9d682effba1ee1e88dc85d8266b8ed4856ffad7

  • SHA256

    fa57f7cba4406d815947a3a2481842f6b0e1c6d82cb3e78d0526b1921222363b

  • SHA512

    c3a0cc93d2db9f02ab404272ede18ad4b17345eae431b040b80713d8e4b684ccb5b4be09675afcdf751d45bf90e1b8ac903f2e5d3ba27d36d2976a883d981187

Malware Config

Targets

    • Target

      FA57F7CBA4406D815947A3A2481842F6B0E1C6D82CB3E.exe

    • Size

      1.2MB

    • MD5

      c254954614087279f57a4ccf72b0f17e

    • SHA1

      c9d682effba1ee1e88dc85d8266b8ed4856ffad7

    • SHA256

      fa57f7cba4406d815947a3a2481842f6b0e1c6d82cb3e78d0526b1921222363b

    • SHA512

      c3a0cc93d2db9f02ab404272ede18ad4b17345eae431b040b80713d8e4b684ccb5b4be09675afcdf751d45bf90e1b8ac903f2e5d3ba27d36d2976a883d981187

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks