General

  • Target

    expressvpn_windows_12.51.0.4_release.exe

  • Size

    62.9MB

  • Sample

    230625-xhvyaaed73

  • MD5

    c7a0290ac607dda06b5a83dc29d0dbb3

  • SHA1

    627ef1672e58add4e0863d5fbd5e63b7666df489

  • SHA256

    2ec6df9a41e10daed0543128f9dcc897017828c12d4e78f0c4ad2f2b37aaaff0

  • SHA512

    13c079a3719b686d958f1794712ef236e33933edcaaab778b2938b0b9315527f98e514c8a7e0d3857185a40d249a11cd45fcee98c8c3eeef38b62a723ef1f012

  • SSDEEP

    1572864:eA9T8BsJn5wq9hWLN4V0HjU6o5hykKjtNJJbXoilwyf:eAaB4KMKeVOho5h7K5NfoSf

Malware Config

Targets

    • Target

      expressvpn_windows_12.51.0.4_release.exe

    • Size

      62.9MB

    • MD5

      c7a0290ac607dda06b5a83dc29d0dbb3

    • SHA1

      627ef1672e58add4e0863d5fbd5e63b7666df489

    • SHA256

      2ec6df9a41e10daed0543128f9dcc897017828c12d4e78f0c4ad2f2b37aaaff0

    • SHA512

      13c079a3719b686d958f1794712ef236e33933edcaaab778b2938b0b9315527f98e514c8a7e0d3857185a40d249a11cd45fcee98c8c3eeef38b62a723ef1f012

    • SSDEEP

      1572864:eA9T8BsJn5wq9hWLN4V0HjU6o5hykKjtNJJbXoilwyf:eAaB4KMKeVOho5h7K5NfoSf

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Downloads MZ/PE file

    • Adds Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks