General

  • Target

    0x000a0000000122da-58.dat

  • Size

    86KB

  • Sample

    220612-rm76hseggn

  • MD5

    117fa52c8400ad57e1a32503e7138abc

  • SHA1

    e6cfae7554a85bf343089ba627688ff122188a9e

  • SHA256

    e2b4fb5fd4705700ffa3423a9384039f03967d60c6eac79cc9b9171401ea19ce

  • SHA512

    e615ad092197caca9e6b60d9599b1dc6b66554d9030237bfb109ffc2fbd851efbc623037fe0c9d776cbac9ae8ef232e84b3432df7bed653f343269cac8a17f23

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

blessed147.ddns.net:8089

Mutex

RV_MUTEX

Targets

    • Target

      0x000a0000000122da-58.dat

    • Size

      86KB

    • MD5

      117fa52c8400ad57e1a32503e7138abc

    • SHA1

      e6cfae7554a85bf343089ba627688ff122188a9e

    • SHA256

      e2b4fb5fd4705700ffa3423a9384039f03967d60c6eac79cc9b9171401ea19ce

    • SHA512

      e615ad092197caca9e6b60d9599b1dc6b66554d9030237bfb109ffc2fbd851efbc623037fe0c9d776cbac9ae8ef232e84b3432df7bed653f343269cac8a17f23

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Uses the VBS compiler for execution

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks