General

  • Target

    365d0d94f8f8aa65f2eb9a6080d023ca3b3828bbf1c96776a256084958e7b05f

  • Size

    231KB

  • Sample

    220512-nxkanagadj

  • MD5

    09cd267ca92d6c3dcbaa05e70477962f

  • SHA1

    a9786770752e9f6ca8a49f109cf9fe9783e5aa9d

  • SHA256

    365d0d94f8f8aa65f2eb9a6080d023ca3b3828bbf1c96776a256084958e7b05f

  • SHA512

    87bfe294cdcd711a44976f8aec1aa51d48fe9cc83ed08ab6ef04a1c144fb545874f517d9f9232f1fef2bc154b8da0cda6d3259bf8952ebb683e69b04c09bb83a

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

195.206.106.176:7865

Mutex

RV_MUTEX

Targets

    • Target

      365d0d94f8f8aa65f2eb9a6080d023ca3b3828bbf1c96776a256084958e7b05f

    • Size

      231KB

    • MD5

      09cd267ca92d6c3dcbaa05e70477962f

    • SHA1

      a9786770752e9f6ca8a49f109cf9fe9783e5aa9d

    • SHA256

      365d0d94f8f8aa65f2eb9a6080d023ca3b3828bbf1c96776a256084958e7b05f

    • SHA512

      87bfe294cdcd711a44976f8aec1aa51d48fe9cc83ed08ab6ef04a1c144fb545874f517d9f9232f1fef2bc154b8da0cda6d3259bf8952ebb683e69b04c09bb83a

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks