General

  • Target

    Client.exe

  • Size

    141KB

  • Sample

    230610-td2cqafc54

  • MD5

    c3e33f24ab5a6102d5c33e6f3d47d911

  • SHA1

    d7575d9e69ec272a5a0951945650f8eea70a87a5

  • SHA256

    262de1017184a87e3fb92326bc948f6c9a4b8948d29ef16d7c8f1a3aaab04d62

  • SHA512

    6f857ed9d181303c37176f41a7bde65202f6f714b7516fa75e33e9c191d8da42e14154ba48da833156e1887ac51919318f78d264cc2515112588f5d1151262b9

  • SSDEEP

    3072:qEGC9MVoMvdq6/ghjb2K8IGcK8CAUhlkRsr:qy9lMTUBS3

Malware Config

Targets

    • Target

      Client.exe

    • Size

      141KB

    • MD5

      c3e33f24ab5a6102d5c33e6f3d47d911

    • SHA1

      d7575d9e69ec272a5a0951945650f8eea70a87a5

    • SHA256

      262de1017184a87e3fb92326bc948f6c9a4b8948d29ef16d7c8f1a3aaab04d62

    • SHA512

      6f857ed9d181303c37176f41a7bde65202f6f714b7516fa75e33e9c191d8da42e14154ba48da833156e1887ac51919318f78d264cc2515112588f5d1151262b9

    • SSDEEP

      3072:qEGC9MVoMvdq6/ghjb2K8IGcK8CAUhlkRsr:qy9lMTUBS3

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Tasks