General

  • Target

    d94c2a5ea62d3c59414860b031c2926c30603f6276030f5ab5d6796d59b918ea

  • Size

    17KB

  • Sample

    220523-3z7ajadegm

  • MD5

    759e1216fa75f7fca3bc7c84094ca531

  • SHA1

    399e938b13613873c3f50759ce9386a38968ca3f

  • SHA256

    d94c2a5ea62d3c59414860b031c2926c30603f6276030f5ab5d6796d59b918ea

  • SHA512

    7bb0bbe4033b966978c4a621822b40184e0a63748151cdfe50fb7d659c74dedae8c9e8fd142e1aaf495c23556683173b70ba65e4af14ebac44c6fa787fa66917

Malware Config

Extracted

Family

revengerat

Botnet

2SP Force DZ

C2

imaneblueyesvpn.ddns.net:333

Mutex

RV_MUTEX-jpnFwUnoWrUUg

Targets

    • Target

      d94c2a5ea62d3c59414860b031c2926c30603f6276030f5ab5d6796d59b918ea

    • Size

      17KB

    • MD5

      759e1216fa75f7fca3bc7c84094ca531

    • SHA1

      399e938b13613873c3f50759ce9386a38968ca3f

    • SHA256

      d94c2a5ea62d3c59414860b031c2926c30603f6276030f5ab5d6796d59b918ea

    • SHA512

      7bb0bbe4033b966978c4a621822b40184e0a63748151cdfe50fb7d659c74dedae8c9e8fd142e1aaf495c23556683173b70ba65e4af14ebac44c6fa787fa66917

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks