General

  • Target

    sinple.exe

  • Size

    137KB

  • Sample

    230608-ntxrkseh85

  • MD5

    0923eeaec8c777e7d62d15fd71c46aaf

  • SHA1

    17e5d701a931468b17e49f06b3eddc5d88a4dcf3

  • SHA256

    06a0a8d963239e64adfedf7332c222e2beaf2aa4ab971bc1c9e5b9804a30ee6f

  • SHA512

    9847456153f74f06b2db1bec6eb4d3059e3d25932f2ed2164f9faec1b63dced1567d183c7698bf7ea18f7c9c2af198b37e10af38fbc5d91d43eb066fbf14cf99

  • SSDEEP

    1536:kH6WZp3eiNTQutHV/R6T3wLa0k2lMh61vceasJ1UIkEQLQ7qdLvMVlpby0INC:KVpupY/U3w2H4hceJhZAQ7aLvMVy0Iw

Malware Config

Targets

    • Target

      sinple.exe

    • Size

      137KB

    • MD5

      0923eeaec8c777e7d62d15fd71c46aaf

    • SHA1

      17e5d701a931468b17e49f06b3eddc5d88a4dcf3

    • SHA256

      06a0a8d963239e64adfedf7332c222e2beaf2aa4ab971bc1c9e5b9804a30ee6f

    • SHA512

      9847456153f74f06b2db1bec6eb4d3059e3d25932f2ed2164f9faec1b63dced1567d183c7698bf7ea18f7c9c2af198b37e10af38fbc5d91d43eb066fbf14cf99

    • SSDEEP

      1536:kH6WZp3eiNTQutHV/R6T3wLa0k2lMh61vceasJ1UIkEQLQ7qdLvMVlpby0INC:KVpupY/U3w2H4hceJhZAQ7aLvMVy0Iw

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks