General

  • Target

    c99d475a1d153a4e46829fa4c1cfebeb7ac73c3a5723d873fb5ff80ad32903b2

  • Size

    17KB

  • Sample

    220523-3qpzwshgg3

  • MD5

    df66356151d4671e06f88a44b4c28dd3

  • SHA1

    015f855ae32785eb9ea8ad1ecf252e3b6efaf88a

  • SHA256

    c99d475a1d153a4e46829fa4c1cfebeb7ac73c3a5723d873fb5ff80ad32903b2

  • SHA512

    bde5b8f19acca1dbec8516bfc9391173edad64315a8277c454e296807a2fae7cafdc644707e082c5f984e546893f6220651895665b4f0489aeb565457e0e4a83

Malware Config

Extracted

Family

revengerat

Botnet

M939

C2

landbo.ddns.net:2772

Mutex

RV_MUTEX-JRMSltdcKeYu

Targets

    • Target

      c99d475a1d153a4e46829fa4c1cfebeb7ac73c3a5723d873fb5ff80ad32903b2

    • Size

      17KB

    • MD5

      df66356151d4671e06f88a44b4c28dd3

    • SHA1

      015f855ae32785eb9ea8ad1ecf252e3b6efaf88a

    • SHA256

      c99d475a1d153a4e46829fa4c1cfebeb7ac73c3a5723d873fb5ff80ad32903b2

    • SHA512

      bde5b8f19acca1dbec8516bfc9391173edad64315a8277c454e296807a2fae7cafdc644707e082c5f984e546893f6220651895665b4f0489aeb565457e0e4a83

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks