General

  • Target

    4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118

  • Size

    819KB

  • Sample

    220707-3v4nvahbfr

  • MD5

    5b9dd49ffe63a9cc638f28383cacac8f

  • SHA1

    6ea781eb54e023b9dc06599be6349cb7c7eb8a37

  • SHA256

    4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118

  • SHA512

    abdb1b0f3b18c8a85b5b3bd7dced382408cf0f37aa47dfc622546b793e17f5629f475666c399e0eafbc16c94368b1a727e6bdbaf104f00df2b9e04910662a36f

Malware Config

Extracted

Family

revengerat

Botnet

BABAYAGA

C2

condor777.chickenkiller.com:1604

Mutex

EZlNApdygPhSv

Targets

    • Target

      4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118

    • Size

      819KB

    • MD5

      5b9dd49ffe63a9cc638f28383cacac8f

    • SHA1

      6ea781eb54e023b9dc06599be6349cb7c7eb8a37

    • SHA256

      4322f3a9121766619306d7b91f2620880d40d038350f924391cc9f0fb38b1118

    • SHA512

      abdb1b0f3b18c8a85b5b3bd7dced382408cf0f37aa47dfc622546b793e17f5629f475666c399e0eafbc16c94368b1a727e6bdbaf104f00df2b9e04910662a36f

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks