General

  • Target

    41265978129d25cb75b2523d24896a39d37273e285e165800c0bea6c2caac60a

  • Size

    263KB

  • Sample

    220708-he7qcadedq

  • MD5

    594e681165d7f6a566cae99cf29b02ea

  • SHA1

    d2bcd07d94be4fbbcc87df9d9e5c69340a897cc0

  • SHA256

    41265978129d25cb75b2523d24896a39d37273e285e165800c0bea6c2caac60a

  • SHA512

    c3e720ac73e29beef0ca3f4998e9ce0d5e2784defe0401836d8f1171c10126cf16432c86e28d63bf97a78f929937d3582b7aee85f43c046e5ba2d3cab46e3f67

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

18.188.125.21:4545

Mutex

RV_MUTEX

Targets

    • Target

      41265978129d25cb75b2523d24896a39d37273e285e165800c0bea6c2caac60a

    • Size

      263KB

    • MD5

      594e681165d7f6a566cae99cf29b02ea

    • SHA1

      d2bcd07d94be4fbbcc87df9d9e5c69340a897cc0

    • SHA256

      41265978129d25cb75b2523d24896a39d37273e285e165800c0bea6c2caac60a

    • SHA512

      c3e720ac73e29beef0ca3f4998e9ce0d5e2784defe0401836d8f1171c10126cf16432c86e28d63bf97a78f929937d3582b7aee85f43c046e5ba2d3cab46e3f67

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks