General

  • Target

    071d12bc84a949c660622c6841f06be081d8ee509df644e8009ba38d11ab174e

  • Size

    208KB

  • Sample

    220708-ktjyyaabgl

  • MD5

    c68bd5a4df2ed8c3949261f5b5f52a9f

  • SHA1

    4a24320052bf995cdf6693faed878d29f08d43ee

  • SHA256

    071d12bc84a949c660622c6841f06be081d8ee509df644e8009ba38d11ab174e

  • SHA512

    485a27f292a4d3806e477009148bc4408cb33467a61cb4411f20383405efc52facaa5b3dfb3464f530d248377838b18ee39b90cdf5810553149a432d724ca206

Malware Config

Targets

    • Target

      071d12bc84a949c660622c6841f06be081d8ee509df644e8009ba38d11ab174e

    • Size

      208KB

    • MD5

      c68bd5a4df2ed8c3949261f5b5f52a9f

    • SHA1

      4a24320052bf995cdf6693faed878d29f08d43ee

    • SHA256

      071d12bc84a949c660622c6841f06be081d8ee509df644e8009ba38d11ab174e

    • SHA512

      485a27f292a4d3806e477009148bc4408cb33467a61cb4411f20383405efc52facaa5b3dfb3464f530d248377838b18ee39b90cdf5810553149a432d724ca206

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks