Resubmissions

28-04-2024 18:31

240428-w6cwyaec5v 10

21-04-2024 08:57

240421-kwwqhsfh8z 10

21-04-2024 05:45

240421-gfvazacf82 10

18-04-2024 19:05

240418-xry2ascb73 10

18-04-2024 16:34

240418-t3alashf75 10

04-03-2024 18:33

240304-w7b12ahg61 10

02-03-2024 17:01

240302-vjn51sff57 10

02-03-2024 10:05

240302-l4xhfscc7v 10

Analysis

  • max time kernel
    163s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2023 06:40

General

  • Target

    bazaar.2020.02/HEUR-Backdoor.MSIL.Revenge.exe

  • Size

    16KB

  • MD5

    fc8f4e31d85e796c1efe9b0fabeed23a

  • SHA1

    e15233a69c32761d8ad0e293ce1ed2e1162d5647

  • SHA256

    c35e3bdf0d1a7275e73f3c8c9fb57cf874ffa19ffafae649025b1e90cd07c096

  • SHA512

    36e40d94711c82fb1669e3143d63833a3f7ad1b0ea8dae00287cbcdfd154135a3d7042702e4900193d0dcae94b0d03f7b6a9fb545e20c709fd4fb4a1cae95351

  • SSDEEP

    384:sxF6Mj9VnRq2Rj9oM+bYO+4kr9oDPlMNcLlb5sVKdyS5Ct:sxF6Mj9V5bDclMNE9o

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

127.0.0.1:90

Mutex

RV_MUTEX

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Backdoor.MSIL.Revenge.exe
    "C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Backdoor.MSIL.Revenge.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2472

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2472-133-0x00007FFCF07B0000-0x00007FFCF1151000-memory.dmp

    Filesize

    9.6MB

  • memory/2472-134-0x00007FFCF07B0000-0x00007FFCF1151000-memory.dmp

    Filesize

    9.6MB

  • memory/2472-135-0x00000000017E0000-0x00000000017F0000-memory.dmp

    Filesize

    64KB

  • memory/2472-136-0x0000000000DD0000-0x0000000000DD8000-memory.dmp

    Filesize

    32KB

  • memory/2472-137-0x000000001C2F0000-0x000000001C7BE000-memory.dmp

    Filesize

    4.8MB

  • memory/2472-138-0x000000001C7C0000-0x000000001C866000-memory.dmp

    Filesize

    664KB

  • memory/2472-139-0x000000001C930000-0x000000001C992000-memory.dmp

    Filesize

    392KB

  • memory/2472-140-0x00007FFCF07B0000-0x00007FFCF1151000-memory.dmp

    Filesize

    9.6MB