General

  • Target

    cc4ed73007aedb03d2b0667ec52a0540754f5d3203a10a30af2ab367bea2b2a5

  • Size

    121KB

  • Sample

    220418-vlaemsgahn

  • MD5

    3ad976d796ac80ee82a08bc88f957baa

  • SHA1

    c0cee3e7d57cef992bf2e5c6c673329551ad42f7

  • SHA256

    cc4ed73007aedb03d2b0667ec52a0540754f5d3203a10a30af2ab367bea2b2a5

  • SHA512

    cfeb330251d8e4800380f160c3fe9fdd853147273cfe0786cdd00e7ac6753c7a694edb985f08eaa8192312e913cc766a84fbe04a8de69b8c717b792fb9b0c026

Malware Config

Targets

    • Target

      cc4ed73007aedb03d2b0667ec52a0540754f5d3203a10a30af2ab367bea2b2a5

    • Size

      121KB

    • MD5

      3ad976d796ac80ee82a08bc88f957baa

    • SHA1

      c0cee3e7d57cef992bf2e5c6c673329551ad42f7

    • SHA256

      cc4ed73007aedb03d2b0667ec52a0540754f5d3203a10a30af2ab367bea2b2a5

    • SHA512

      cfeb330251d8e4800380f160c3fe9fdd853147273cfe0786cdd00e7ac6753c7a694edb985f08eaa8192312e913cc766a84fbe04a8de69b8c717b792fb9b0c026

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks