General

  • Target

    196daae5b03840f378df5af46824ff7bd77fdee3eea83d342ee952a1bd25548c

  • Size

    7.2MB

  • Sample

    220524-1c1hcscfbn

  • MD5

    3955a6d8e167f30a9254d4754425da8d

  • SHA1

    0bfee09bc4d80744a28c32670d8c2c09e696e0ef

  • SHA256

    196daae5b03840f378df5af46824ff7bd77fdee3eea83d342ee952a1bd25548c

  • SHA512

    3b7a838e7207b4eaf770d55ad7f929839f4197d15b2a51787da52eafe63151ee117a8f995c58350f94596e8d2e1a1a2093cc1415835f1c09b51caad1b7faa484

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

rattedlmao.ddns.net:1337

Mutex

RV_MUTEX

Targets

    • Target

      196daae5b03840f378df5af46824ff7bd77fdee3eea83d342ee952a1bd25548c

    • Size

      7.2MB

    • MD5

      3955a6d8e167f30a9254d4754425da8d

    • SHA1

      0bfee09bc4d80744a28c32670d8c2c09e696e0ef

    • SHA256

      196daae5b03840f378df5af46824ff7bd77fdee3eea83d342ee952a1bd25548c

    • SHA512

      3b7a838e7207b4eaf770d55ad7f929839f4197d15b2a51787da52eafe63151ee117a8f995c58350f94596e8d2e1a1a2093cc1415835f1c09b51caad1b7faa484

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Uses the VBS compiler for execution

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks