General

  • Target

    abaadb13e68f75e822c4d9468506cdeeb747eb88c7fec0f68b8b5b6d975b91ef

  • Size

    873KB

  • Sample

    220525-b41vrsehc4

  • MD5

    36d7527dfeb6545fa18c41686ace0388

  • SHA1

    d5da31212c94e127b21ba0a80e32dc84eb86d0e8

  • SHA256

    abaadb13e68f75e822c4d9468506cdeeb747eb88c7fec0f68b8b5b6d975b91ef

  • SHA512

    c06dde1ebb168d0e7a997d57cd46ae13be2ceec1a60bb09869809bd498b6a42a4101d7a06fbcafe90cddbd16862d1ad73c4405e7b2b9f171639584bb02ed2a56

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

ournewcompany2.hopto.org:333

Mutex

RV_MUTEX

Targets

    • Target

      abaadb13e68f75e822c4d9468506cdeeb747eb88c7fec0f68b8b5b6d975b91ef

    • Size

      873KB

    • MD5

      36d7527dfeb6545fa18c41686ace0388

    • SHA1

      d5da31212c94e127b21ba0a80e32dc84eb86d0e8

    • SHA256

      abaadb13e68f75e822c4d9468506cdeeb747eb88c7fec0f68b8b5b6d975b91ef

    • SHA512

      c06dde1ebb168d0e7a997d57cd46ae13be2ceec1a60bb09869809bd498b6a42a4101d7a06fbcafe90cddbd16862d1ad73c4405e7b2b9f171639584bb02ed2a56

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks