General

  • Target

    abfd0ec88952e18bc865d99fd4e46763fea6fa67bbff6547a23381512b4d3aa9.bin

  • Size

    143KB

  • Sample

    220719-sn5mfsehd7

  • MD5

    834e298ddb53c9904fb041c8fd72bf71

  • SHA1

    4393a2100d4948977946589db27e6c9dbe66786b

  • SHA256

    abfd0ec88952e18bc865d99fd4e46763fea6fa67bbff6547a23381512b4d3aa9

  • SHA512

    2ae3498cd6ea56263fc160a8df04dcf2c9bfe1c58e412fd5fab4566d6de17288cc8ba9387c184a1a9c4c9c245ce438ac311b10f0498e070dc0f2cd66863d03ec

Malware Config

Targets

    • Target

      abfd0ec88952e18bc865d99fd4e46763fea6fa67bbff6547a23381512b4d3aa9.bin

    • Size

      143KB

    • MD5

      834e298ddb53c9904fb041c8fd72bf71

    • SHA1

      4393a2100d4948977946589db27e6c9dbe66786b

    • SHA256

      abfd0ec88952e18bc865d99fd4e46763fea6fa67bbff6547a23381512b4d3aa9

    • SHA512

      2ae3498cd6ea56263fc160a8df04dcf2c9bfe1c58e412fd5fab4566d6de17288cc8ba9387c184a1a9c4c9c245ce438ac311b10f0498e070dc0f2cd66863d03ec

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Tasks