General

  • Target

    10a28503ba499d3291c1efaef2d80b9b592080985145620a385ae81da445e834

  • Size

    109KB

  • Sample

    220604-nwbbcsdhf4

  • MD5

    efc82597070103fb87f32c43869a90a3

  • SHA1

    ac3dc577cc7a105cf6db8c43bf3c8e109080ea90

  • SHA256

    10a28503ba499d3291c1efaef2d80b9b592080985145620a385ae81da445e834

  • SHA512

    3f48b30cb0c14d572bad8ef8f2f00c9b2ddcf4f27dcc24c6a3966c1ce8fdc6ab95dceecf4584ae0784fe1d609d7b652c6977abdc81b59f0996df72d98f1f5303

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

gyhjgyj.myq-see.com:333

Mutex

RV_MUTEX-AgZblRvZwfRtN

Targets

    • Target

      10a28503ba499d3291c1efaef2d80b9b592080985145620a385ae81da445e834

    • Size

      109KB

    • MD5

      efc82597070103fb87f32c43869a90a3

    • SHA1

      ac3dc577cc7a105cf6db8c43bf3c8e109080ea90

    • SHA256

      10a28503ba499d3291c1efaef2d80b9b592080985145620a385ae81da445e834

    • SHA512

      3f48b30cb0c14d572bad8ef8f2f00c9b2ddcf4f27dcc24c6a3966c1ce8fdc6ab95dceecf4584ae0784fe1d609d7b652c6977abdc81b59f0996df72d98f1f5303

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Tasks