General

  • Target

    51ff317a7f4b1753938b872d93f6a4bfca165efd.exe

  • Size

    527KB

  • Sample

    221130-lcg9fsba6x

  • MD5

    9d2bc7717dfb6ad6b01622523b7f8897

  • SHA1

    51ff317a7f4b1753938b872d93f6a4bfca165efd

  • SHA256

    bc3fdaa5357692fd7705ed5f0a9988cfdf69e1786958e56dad15b3a58990dbb2

  • SHA512

    a80f2497f6271fa91d46553e08d049bfa571d1c8c8f3d8c9a742b394c1eab6f6a6987141ea4c6d2c57f743d4542f83692a687a3131bcce1e7ebaba17d1fc6456

  • SSDEEP

    12288:0YV6MorX7qzuC3QHO9FQVHPF51jgc9QzXjnrIV:zBXu9HGaVH9Qzz8V

Malware Config

Extracted

Family

revengerat

Botnet

May

C2

mallorca.myftp.org:5198

mbvd.hopto.org:5198

Mutex

RV_MUTEX-DlgZblRvZwfRtN

Targets

    • Target

      51ff317a7f4b1753938b872d93f6a4bfca165efd.exe

    • Size

      527KB

    • MD5

      9d2bc7717dfb6ad6b01622523b7f8897

    • SHA1

      51ff317a7f4b1753938b872d93f6a4bfca165efd

    • SHA256

      bc3fdaa5357692fd7705ed5f0a9988cfdf69e1786958e56dad15b3a58990dbb2

    • SHA512

      a80f2497f6271fa91d46553e08d049bfa571d1c8c8f3d8c9a742b394c1eab6f6a6987141ea4c6d2c57f743d4542f83692a687a3131bcce1e7ebaba17d1fc6456

    • SSDEEP

      12288:0YV6MorX7qzuC3QHO9FQVHPF51jgc9QzXjnrIV:zBXu9HGaVH9Qzz8V

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks