General

  • Target

    08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779

  • Size

    345KB

  • Sample

    220530-1lg3dagbfk

  • MD5

    b4f7d6c32fd88f6f0743eb92dead9508

  • SHA1

    148dc196a6c47cf25e09b626d061c9ea1d5ba531

  • SHA256

    08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779

  • SHA512

    119fd596fbfe7e97a5bfdb2d39e681e038adcf31aaeea7c4c884a908dc6736ec36991b55e69a374832553bb41bfae02b35264b54a5ed076bde0db7bfa25f3a42

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

185.29.10.15:6984

Mutex

RV_MUTEX-LuSAtYBxGgZH

Targets

    • Target

      08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779

    • Size

      345KB

    • MD5

      b4f7d6c32fd88f6f0743eb92dead9508

    • SHA1

      148dc196a6c47cf25e09b626d061c9ea1d5ba531

    • SHA256

      08812395ae9ee8cced9280aa0da4186a06d69e9bc2a1aef970ca383f504a4779

    • SHA512

      119fd596fbfe7e97a5bfdb2d39e681e038adcf31aaeea7c4c884a908dc6736ec36991b55e69a374832553bb41bfae02b35264b54a5ed076bde0db7bfa25f3a42

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks