General

  • Target

    a249d8206e822a6ffabae98e32edfd9ce51712f46cddb0e46aa036292ef3478b

  • Size

    145KB

  • Sample

    220512-szb5aaabf8

  • MD5

    e7e05d8e84625f85157ccbdd6c16dc2c

  • SHA1

    8bed6a9550c2e9e7a8c418dfc5990841197230b8

  • SHA256

    a249d8206e822a6ffabae98e32edfd9ce51712f46cddb0e46aa036292ef3478b

  • SHA512

    e3fd9fdbc6ffeb18851c4e23df3d5c7218b6dad2b401cbb970f5fe6bb4c2bff6406dfebf5e974d942f246ab3cec3c41fbdacf722435fca205a44cf82b5805241

Malware Config

Targets

    • Target

      a249d8206e822a6ffabae98e32edfd9ce51712f46cddb0e46aa036292ef3478b

    • Size

      145KB

    • MD5

      e7e05d8e84625f85157ccbdd6c16dc2c

    • SHA1

      8bed6a9550c2e9e7a8c418dfc5990841197230b8

    • SHA256

      a249d8206e822a6ffabae98e32edfd9ce51712f46cddb0e46aa036292ef3478b

    • SHA512

      e3fd9fdbc6ffeb18851c4e23df3d5c7218b6dad2b401cbb970f5fe6bb4c2bff6406dfebf5e974d942f246ab3cec3c41fbdacf722435fca205a44cf82b5805241

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks