General

  • Target

    net.exe

  • Size

    142KB

  • Sample

    230611-ma2ezshf2y

  • MD5

    08b7405b0067a9c129131d5321149fd6

  • SHA1

    bf6eea2a57b4f9141cdf0b915bc688582586a082

  • SHA256

    6e0a79de47349533cdc95befec0b037d401fb4e0e7ac306ee9a519bc16ca7282

  • SHA512

    72aea47914e21519a7ce5f212922681cf96f1437856eab180c6dcbfc382fc2a2a5149cf98b37caddc8bef238589b9b436434e2c8eacfa074ac8a3e32f833d715

  • SSDEEP

    3072:/nN71XTVFuqrrTfY3aTxt0CL0kBvYHhZmApSNc6:/nZ1j6qrnfYKfxLgjcN

Malware Config

Targets

    • Target

      net.exe

    • Size

      142KB

    • MD5

      08b7405b0067a9c129131d5321149fd6

    • SHA1

      bf6eea2a57b4f9141cdf0b915bc688582586a082

    • SHA256

      6e0a79de47349533cdc95befec0b037d401fb4e0e7ac306ee9a519bc16ca7282

    • SHA512

      72aea47914e21519a7ce5f212922681cf96f1437856eab180c6dcbfc382fc2a2a5149cf98b37caddc8bef238589b9b436434e2c8eacfa074ac8a3e32f833d715

    • SSDEEP

      3072:/nN71XTVFuqrrTfY3aTxt0CL0kBvYHhZmApSNc6:/nZ1j6qrnfYKfxLgjcN

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Tasks