General

  • Target

    7dcf9edbb6c768e78ac0f21c2096f64ae4a2502b687435b578cc2a1a828384a2

  • Size

    17KB

  • Sample

    220708-jvkfesadd9

  • MD5

    3e2021ca808317e1eb7c2e0a0c8ae009

  • SHA1

    713c6d2139f0f0a00b911d2b3ac2a5cdda08995b

  • SHA256

    7dcf9edbb6c768e78ac0f21c2096f64ae4a2502b687435b578cc2a1a828384a2

  • SHA512

    73e64d3adf64310ee56d4c2774cc318fae633e1cb3f80df15436a37c4a8185ab881a3906ec99c360f8a8fa3e8341c06898f26233ffe6462eb708947bc8ef9371

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

dnstext.publicvm.com:111

Mutex

RV_MUTEX-DxjEexVoqqNL

Targets

    • Target

      7dcf9edbb6c768e78ac0f21c2096f64ae4a2502b687435b578cc2a1a828384a2

    • Size

      17KB

    • MD5

      3e2021ca808317e1eb7c2e0a0c8ae009

    • SHA1

      713c6d2139f0f0a00b911d2b3ac2a5cdda08995b

    • SHA256

      7dcf9edbb6c768e78ac0f21c2096f64ae4a2502b687435b578cc2a1a828384a2

    • SHA512

      73e64d3adf64310ee56d4c2774cc318fae633e1cb3f80df15436a37c4a8185ab881a3906ec99c360f8a8fa3e8341c06898f26233ffe6462eb708947bc8ef9371

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks