General

  • Target

    e8da9985457f46542b7f8c9c2e48f252f6f0d998223271a1bf073754fda2e8e3

  • Size

    56KB

  • Sample

    220516-clc7eshhg4

  • MD5

    82c482f8af3d699aeb51034dc506cd1c

  • SHA1

    1c65ce6be62627ee36db9c1b1d912297e6f99abe

  • SHA256

    e8da9985457f46542b7f8c9c2e48f252f6f0d998223271a1bf073754fda2e8e3

  • SHA512

    6f55468830a5fa9fdf30d12300e3fe71ce9ff48f3ebc1d261d2ef50579b0b1aef4b3aff3cf7b337cf92b9b18bc1fe0de9cc9166fa40f5136dfb7151e0fe62899

Malware Config

Targets

    • Target

      e8da9985457f46542b7f8c9c2e48f252f6f0d998223271a1bf073754fda2e8e3

    • Size

      56KB

    • MD5

      82c482f8af3d699aeb51034dc506cd1c

    • SHA1

      1c65ce6be62627ee36db9c1b1d912297e6f99abe

    • SHA256

      e8da9985457f46542b7f8c9c2e48f252f6f0d998223271a1bf073754fda2e8e3

    • SHA512

      6f55468830a5fa9fdf30d12300e3fe71ce9ff48f3ebc1d261d2ef50579b0b1aef4b3aff3cf7b337cf92b9b18bc1fe0de9cc9166fa40f5136dfb7151e0fe62899

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks