General

  • Target

    117279ffc6d5a75fdb19a3096b9c6e48c7086567d777f1ca69f78aff69b589f2

  • Size

    22KB

  • Sample

    220511-cj7m9afggq

  • MD5

    2793ea0c8c30c836fc53b4d8afd6ff8b

  • SHA1

    a99b960af5a24cb16776d0953a392f0186c1398c

  • SHA256

    117279ffc6d5a75fdb19a3096b9c6e48c7086567d777f1ca69f78aff69b589f2

  • SHA512

    cb641b3f0aa28360f0df8e63cb24dc5aaf2365db108473f72f62d495ccfaf34b3601db1d8bfa6f06bdab5d2d27cddb5fd5fa1fb1745989b12234501d64834d52

Malware Config

Extracted

Family

revengerat

Mutex

Targets

    • Target

      117279ffc6d5a75fdb19a3096b9c6e48c7086567d777f1ca69f78aff69b589f2

    • Size

      22KB

    • MD5

      2793ea0c8c30c836fc53b4d8afd6ff8b

    • SHA1

      a99b960af5a24cb16776d0953a392f0186c1398c

    • SHA256

      117279ffc6d5a75fdb19a3096b9c6e48c7086567d777f1ca69f78aff69b589f2

    • SHA512

      cb641b3f0aa28360f0df8e63cb24dc5aaf2365db108473f72f62d495ccfaf34b3601db1d8bfa6f06bdab5d2d27cddb5fd5fa1fb1745989b12234501d64834d52

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks