General

  • Target

    370be7daedd5d09002bd08ef0195a783d367672399c081c1053f36028191b878

  • Size

    34KB

  • Sample

    220626-ayxqgscda4

  • MD5

    8223ed91a842abd590bf94d3547648ca

  • SHA1

    16911011bfd074c1e94feedf3099b7588bf64772

  • SHA256

    370be7daedd5d09002bd08ef0195a783d367672399c081c1053f36028191b878

  • SHA512

    fff0c118ee8c2d32e88587d485b5ff8c2a67c516d4926fb84af4e99eacd7f8fb34e0732fb536bf51efd4ccc7554c45044e5c5945720700bd8f8ba8d9b2a29a1e

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

bdder2004.myddns.me:9999

Mutex

RV_MUTEX

Targets

    • Target

      370be7daedd5d09002bd08ef0195a783d367672399c081c1053f36028191b878

    • Size

      34KB

    • MD5

      8223ed91a842abd590bf94d3547648ca

    • SHA1

      16911011bfd074c1e94feedf3099b7588bf64772

    • SHA256

      370be7daedd5d09002bd08ef0195a783d367672399c081c1053f36028191b878

    • SHA512

      fff0c118ee8c2d32e88587d485b5ff8c2a67c516d4926fb84af4e99eacd7f8fb34e0732fb536bf51efd4ccc7554c45044e5c5945720700bd8f8ba8d9b2a29a1e

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Drops startup file

    • Uses the VBS compiler for execution

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks