General

  • Target

    35bf683f6d7cde1df919c3a5e3e23f9c972e051e31f491c6bf87d19ec30de9f5

  • Size

    17KB

  • Sample

    220524-2wyzbaahc6

  • MD5

    cbebcbc400c95f9e0902c71000a79eec

  • SHA1

    9a190e9e398fa7cdf34a8c251f656a671e6ace31

  • SHA256

    35bf683f6d7cde1df919c3a5e3e23f9c972e051e31f491c6bf87d19ec30de9f5

  • SHA512

    1effe5d3a55742f070aade5a5038b36517f0de72ce15cdfa9fff0f8ec5f8505fd44860d49becbe8c75b4752adf12a88e50eaac306e9f57c9a7f39d6b0b53716e

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

0.tcp.ngrok.io:17455

Mutex

RV_MUTEX-bWSTUKIWwiej

Targets

    • Target

      35bf683f6d7cde1df919c3a5e3e23f9c972e051e31f491c6bf87d19ec30de9f5

    • Size

      17KB

    • MD5

      cbebcbc400c95f9e0902c71000a79eec

    • SHA1

      9a190e9e398fa7cdf34a8c251f656a671e6ace31

    • SHA256

      35bf683f6d7cde1df919c3a5e3e23f9c972e051e31f491c6bf87d19ec30de9f5

    • SHA512

      1effe5d3a55742f070aade5a5038b36517f0de72ce15cdfa9fff0f8ec5f8505fd44860d49becbe8c75b4752adf12a88e50eaac306e9f57c9a7f39d6b0b53716e

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks