General

  • Target

    052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1

  • Size

    577KB

  • Sample

    220527-xc2tmscfbm

  • MD5

    1711710d30ed4194ccfde68c6b6f3b22

  • SHA1

    4f399c035bb370610940a96b3aab90eab884a925

  • SHA256

    052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1

  • SHA512

    fbb943b1a20a4fbe0d1d5da5b5b874cb7b728354fc24c4ab1b0d827220052d7b34117980f7a1e993814b83bc02264a8af916a0fd909cbdd065cb11b396fc9353

Malware Config

Extracted

Family

revengerat

Mutex

Extracted

Family

revengerat

Botnet

Guest

C2

93.155.97.82:333

93.155.97.82:1604

neudria.ddns.net:333

neudria.ddns.net:1604

Mutex

RV_MUTEX-ZFbTXZMONFueOci

Targets

    • Target

      052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1

    • Size

      577KB

    • MD5

      1711710d30ed4194ccfde68c6b6f3b22

    • SHA1

      4f399c035bb370610940a96b3aab90eab884a925

    • SHA256

      052ee61fb5185d4a7e4406ca459dc6a089fb58e605d58c0a1cd285985b4ce9e1

    • SHA512

      fbb943b1a20a4fbe0d1d5da5b5b874cb7b728354fc24c4ab1b0d827220052d7b34117980f7a1e993814b83bc02264a8af916a0fd909cbdd065cb11b396fc9353

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Looks for VirtualBox Guest Additions in registry

    • RevengeRat Executable

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks