General

  • Target

    b72a297ee863434bc331a259ff35cd57ecd86deb1c7268966d239f7bf9091c41

  • Size

    135KB

  • Sample

    220420-sd9hnaeeb8

  • MD5

    05795633d94c92e36690c7a652b41ede

  • SHA1

    d0fc9ae02ace9e1985f8ac82a030046838ca428f

  • SHA256

    b72a297ee863434bc331a259ff35cd57ecd86deb1c7268966d239f7bf9091c41

  • SHA512

    6891cc82f2a56a385ea6005fe7e8e68c87c285b2579d4d002b1677257d508efbd7a23a82d9f4392fe21ccf6ac55133c43aef41bf5b31752cb4e8a395226b45b7

Malware Config

Targets

    • Target

      b72a297ee863434bc331a259ff35cd57ecd86deb1c7268966d239f7bf9091c41

    • Size

      135KB

    • MD5

      05795633d94c92e36690c7a652b41ede

    • SHA1

      d0fc9ae02ace9e1985f8ac82a030046838ca428f

    • SHA256

      b72a297ee863434bc331a259ff35cd57ecd86deb1c7268966d239f7bf9091c41

    • SHA512

      6891cc82f2a56a385ea6005fe7e8e68c87c285b2579d4d002b1677257d508efbd7a23a82d9f4392fe21ccf6ac55133c43aef41bf5b31752cb4e8a395226b45b7

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks