General

  • Target

    38ce94566b232068f27ce65238f76af556b99bbf777510849814ab78845202e1

  • Size

    221KB

  • Sample

    220625-xh1tjaabe4

  • MD5

    0000f2fe7835220b78e0861aa65a851b

  • SHA1

    0f84700c4c0d10aa43cc8f11e6bd4a56b16e9b71

  • SHA256

    38ce94566b232068f27ce65238f76af556b99bbf777510849814ab78845202e1

  • SHA512

    13781ef4997f742e5de33ac8c094eff1b7efa0dd93e72f2a8f951f27aa3d3445cdd5c87a49c77671b3bd211355650e92d5d1784c1fbfaea877f7e80fe13ea16b

Malware Config

Targets

    • Target

      38ce94566b232068f27ce65238f76af556b99bbf777510849814ab78845202e1

    • Size

      221KB

    • MD5

      0000f2fe7835220b78e0861aa65a851b

    • SHA1

      0f84700c4c0d10aa43cc8f11e6bd4a56b16e9b71

    • SHA256

      38ce94566b232068f27ce65238f76af556b99bbf777510849814ab78845202e1

    • SHA512

      13781ef4997f742e5de33ac8c094eff1b7efa0dd93e72f2a8f951f27aa3d3445cdd5c87a49c77671b3bd211355650e92d5d1784c1fbfaea877f7e80fe13ea16b

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks