General

  • Target

    5dadcff70276a8aa347136f8df0bd2fbd3342470ba4ef38da696b4426b91b7c6

  • Size

    1.1MB

  • Sample

    220731-2nxraabec2

  • MD5

    90db2df33725d3ee85ccc9f2c241e3c3

  • SHA1

    7efae20c555d7b92255a90097f876183f9a0ac3b

  • SHA256

    5dadcff70276a8aa347136f8df0bd2fbd3342470ba4ef38da696b4426b91b7c6

  • SHA512

    8ff581a8b090ee451b5bcad3bf97535abffd92e56c85a48d93a2a356ede94f210c2516161d02a123c4a541fdf4920e77fb51aa2601efe81d4e6771ac1c918c74

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

127.0.0.1:333

Mutex

RV_MUTEX

Targets

    • Target

      5dadcff70276a8aa347136f8df0bd2fbd3342470ba4ef38da696b4426b91b7c6

    • Size

      1.1MB

    • MD5

      90db2df33725d3ee85ccc9f2c241e3c3

    • SHA1

      7efae20c555d7b92255a90097f876183f9a0ac3b

    • SHA256

      5dadcff70276a8aa347136f8df0bd2fbd3342470ba4ef38da696b4426b91b7c6

    • SHA512

      8ff581a8b090ee451b5bcad3bf97535abffd92e56c85a48d93a2a356ede94f210c2516161d02a123c4a541fdf4920e77fb51aa2601efe81d4e6771ac1c918c74

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks