Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2023 09:26

General

  • Target

    6481f9e27bec4cf6702b6d6a09761c62782f5010da0dfd0a396575c60200279d.exe

  • Size

    17KB

  • MD5

    655f6edee75a4cc49a8fa34567037da9

  • SHA1

    9ff2fc0ccc94230411c3f1507c648867e2306f14

  • SHA256

    6481f9e27bec4cf6702b6d6a09761c62782f5010da0dfd0a396575c60200279d

  • SHA512

    69754378ec7480c708aa3b7e979d0ec465b3e499e811d4a89ff1d5b863f7a796f8d5893fdcc90831c1374dd63782de3d02a06934564ddd1406fcbce98c63d89b

  • SSDEEP

    384:kGbJcK05FdBu6wCX9oDPlMNcLlb5sVKOyv5Ct0:kGbqK2DQUclMNEhou

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

127.0.0.1:333

127.0.0.1:37734

127.0.0.1:12792

songs-travel.at.ply.gg:333

songs-travel.at.ply.gg:37734

songs-travel.at.ply.gg:12792

tcp://5.tcp.eu.ngrok.io:333

tcp://5.tcp.eu.ngrok.io:37734

tcp://5.tcp.eu.ngrok.io:12792

Mutex

RV_MUTEX

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6481f9e27bec4cf6702b6d6a09761c62782f5010da0dfd0a396575c60200279d.exe
    "C:\Users\Admin\AppData\Local\Temp\6481f9e27bec4cf6702b6d6a09761c62782f5010da0dfd0a396575c60200279d.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:4624

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4624-134-0x0000000001510000-0x0000000001520000-memory.dmp
    Filesize

    64KB

  • memory/4624-133-0x0000000000B10000-0x0000000000B18000-memory.dmp
    Filesize

    32KB

  • memory/4624-135-0x000000001BE30000-0x000000001C2FE000-memory.dmp
    Filesize

    4.8MB

  • memory/4624-136-0x000000001C3B0000-0x000000001C456000-memory.dmp
    Filesize

    664KB

  • memory/4624-137-0x000000001C4D0000-0x000000001C532000-memory.dmp
    Filesize

    392KB

  • memory/4624-138-0x0000000001510000-0x0000000001520000-memory.dmp
    Filesize

    64KB