Analysis

  • max time kernel
    151s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 00:56

General

  • Target

    6f0108291363fe6af24a32c77e502e5241369d35bb33b828c899b31824823eef.exe

  • Size

    82KB

  • MD5

    6e6667b71a86780268828232d4363f63

  • SHA1

    e6f6cb0f70c628c797d2e79717cc331c8f5d3f76

  • SHA256

    6f0108291363fe6af24a32c77e502e5241369d35bb33b828c899b31824823eef

  • SHA512

    6400e6e56d5b163050f96d96cb82ad53960efb518760b7c99e7b62886a45d40f1aa914bd872a83fbdc9d0049bcb4ef084ff9027d6affb2cd1363382c6e193395

Malware Config

Extracted

Family

revengerat

Botnet

FRAM 3 FABIO

C2

rua7.ddns.net:1000

Mutex

RV_MUTEX-RRHXJvbCGPPiC

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f0108291363fe6af24a32c77e502e5241369d35bb33b828c899b31824823eef.exe
    "C:\Users\Admin\AppData\Local\Temp\6f0108291363fe6af24a32c77e502e5241369d35bb33b828c899b31824823eef.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\NetFramework.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\NetFramework.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1272

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\NetFramework.exe
    Filesize

    82KB

    MD5

    6e6667b71a86780268828232d4363f63

    SHA1

    e6f6cb0f70c628c797d2e79717cc331c8f5d3f76

    SHA256

    6f0108291363fe6af24a32c77e502e5241369d35bb33b828c899b31824823eef

    SHA512

    6400e6e56d5b163050f96d96cb82ad53960efb518760b7c99e7b62886a45d40f1aa914bd872a83fbdc9d0049bcb4ef084ff9027d6affb2cd1363382c6e193395

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\NetFramework.exe
    Filesize

    82KB

    MD5

    6e6667b71a86780268828232d4363f63

    SHA1

    e6f6cb0f70c628c797d2e79717cc331c8f5d3f76

    SHA256

    6f0108291363fe6af24a32c77e502e5241369d35bb33b828c899b31824823eef

    SHA512

    6400e6e56d5b163050f96d96cb82ad53960efb518760b7c99e7b62886a45d40f1aa914bd872a83fbdc9d0049bcb4ef084ff9027d6affb2cd1363382c6e193395

  • memory/880-54-0x0000000001390000-0x00000000013AC000-memory.dmp
    Filesize

    112KB

  • memory/880-55-0x00000000003F0000-0x00000000003F8000-memory.dmp
    Filesize

    32KB

  • memory/1272-56-0x0000000000000000-mapping.dmp
  • memory/1272-59-0x00000000003D0000-0x00000000003EC000-memory.dmp
    Filesize

    112KB