General

  • Target

    7e41b7ef9b3a3df9b1e76c7dbf7e918a39e342702dd071c9e984ae6156c81f27

  • Size

    122KB

  • Sample

    220420-ses73aeee4

  • MD5

    da30f3af9301ae1d6944fa9ff1990667

  • SHA1

    364a1583ef9993827dd65ed61b2b8f28eb8e44bd

  • SHA256

    7e41b7ef9b3a3df9b1e76c7dbf7e918a39e342702dd071c9e984ae6156c81f27

  • SHA512

    9937368c9c36480459ad541cca916fbce6c6ce3d9225b0a1d149bd27971eec7e9c6e67697c736fa696bfb3cdea48c48a3874479568f070745d00dc686cc0e35f

Malware Config

Targets

    • Target

      7e41b7ef9b3a3df9b1e76c7dbf7e918a39e342702dd071c9e984ae6156c81f27

    • Size

      122KB

    • MD5

      da30f3af9301ae1d6944fa9ff1990667

    • SHA1

      364a1583ef9993827dd65ed61b2b8f28eb8e44bd

    • SHA256

      7e41b7ef9b3a3df9b1e76c7dbf7e918a39e342702dd071c9e984ae6156c81f27

    • SHA512

      9937368c9c36480459ad541cca916fbce6c6ce3d9225b0a1d149bd27971eec7e9c6e67697c736fa696bfb3cdea48c48a3874479568f070745d00dc686cc0e35f

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks