General

  • Target

    9e36bd5d9ee933eb8cf7aaef9a14bb4a1c85ebaf1630b5b5e3fa5bb2f67cf345

  • Size

    1.5MB

  • Sample

    220418-m2xacacddq

  • MD5

    2884f56c8fe181ec634e5f5b059e8943

  • SHA1

    a0c30ab484f36e77a27cafc6265f7ce45bf27612

  • SHA256

    9e36bd5d9ee933eb8cf7aaef9a14bb4a1c85ebaf1630b5b5e3fa5bb2f67cf345

  • SHA512

    297475cc382155d85be34e97eec4623580c3fbbef83c3d926d0a436622bb8ec7b6c938225c61e5772df672af8c4ed4a7e5d2d9aa9d3e0209d01b898dab6bf648

Malware Config

Targets

    • Target

      9e36bd5d9ee933eb8cf7aaef9a14bb4a1c85ebaf1630b5b5e3fa5bb2f67cf345

    • Size

      1.5MB

    • MD5

      2884f56c8fe181ec634e5f5b059e8943

    • SHA1

      a0c30ab484f36e77a27cafc6265f7ce45bf27612

    • SHA256

      9e36bd5d9ee933eb8cf7aaef9a14bb4a1c85ebaf1630b5b5e3fa5bb2f67cf345

    • SHA512

      297475cc382155d85be34e97eec4623580c3fbbef83c3d926d0a436622bb8ec7b6c938225c61e5772df672af8c4ed4a7e5d2d9aa9d3e0209d01b898dab6bf648

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • RevengeRat Executable

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks