General

  • Target

    f167685c3f56500736c2946ef25ddffe3e7a8b6b92d30c3d065bebfdbae70d73

  • Size

    56KB

  • Sample

    220524-s96rmscbhq

  • MD5

    dd647c179fae75262e8c2a8a3bd433e3

  • SHA1

    768f0723d57dcd9a83bb66b16451c12d50c81f89

  • SHA256

    f167685c3f56500736c2946ef25ddffe3e7a8b6b92d30c3d065bebfdbae70d73

  • SHA512

    db99b7f472e3d8f03f85a32967d4b446ccda449e83a00c2eb6738107c076e984d57774bca0235383cb5f7fbf1a344fd54a7ad5626b08d068e96228100eb46e20

Malware Config

Targets

    • Target

      f167685c3f56500736c2946ef25ddffe3e7a8b6b92d30c3d065bebfdbae70d73

    • Size

      56KB

    • MD5

      dd647c179fae75262e8c2a8a3bd433e3

    • SHA1

      768f0723d57dcd9a83bb66b16451c12d50c81f89

    • SHA256

      f167685c3f56500736c2946ef25ddffe3e7a8b6b92d30c3d065bebfdbae70d73

    • SHA512

      db99b7f472e3d8f03f85a32967d4b446ccda449e83a00c2eb6738107c076e984d57774bca0235383cb5f7fbf1a344fd54a7ad5626b08d068e96228100eb46e20

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks