General

  • Target

    a6bf7a9b696448dbc64ed4dfe0c661d6b49d48b421a8b39fa28cb8c9d0b3197a

  • Size

    1.2MB

  • Sample

    220418-wp8x2shgdm

  • MD5

    9adfedfedfc7b1d46190e5877a805394

  • SHA1

    34dc9f850ae29c7fc9c741c6f965b1eeda2ebdb0

  • SHA256

    a6bf7a9b696448dbc64ed4dfe0c661d6b49d48b421a8b39fa28cb8c9d0b3197a

  • SHA512

    3f7b81d359ff78708c5b3bbc2ec3870747a81c16320a3b3bb83e68bb22e7496acd000769c932e017f242206064ca73297c89381296ca68e72af55f44564f08b0

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

hpdndbnb.duckdns.org:2404

Mutex

90a49aa7c27647e

Targets

    • Target

      a6bf7a9b696448dbc64ed4dfe0c661d6b49d48b421a8b39fa28cb8c9d0b3197a

    • Size

      1.2MB

    • MD5

      9adfedfedfc7b1d46190e5877a805394

    • SHA1

      34dc9f850ae29c7fc9c741c6f965b1eeda2ebdb0

    • SHA256

      a6bf7a9b696448dbc64ed4dfe0c661d6b49d48b421a8b39fa28cb8c9d0b3197a

    • SHA512

      3f7b81d359ff78708c5b3bbc2ec3870747a81c16320a3b3bb83e68bb22e7496acd000769c932e017f242206064ca73297c89381296ca68e72af55f44564f08b0

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Turns off Windows Defender SpyNet reporting

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Windows security modification

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks