General

  • Target

    dd203194d0ea8460ac3173e861737a77fa684e5334503867e91a70acc7f73195.zip

  • Size

    8KB

  • Sample

    231005-ha6bqaha91

  • MD5

    b0b33b5e5ee9cf229260602bf7eeeb51

  • SHA1

    6fc24326f7cde649385de22607025ee0dd796e76

  • SHA256

    3529b4f24984447fd6e5c67ed3c92ad4df89304c55504c3b944f63a8340f3148

  • SHA512

    ccdc15258f15dfdf56523ac993324a9406e2a4567abeb3452e28a3fd5d4843c3667edc939b0bb27e012bb82d50fcdb230322deeb461c849e7f88c22183f2de7b

  • SSDEEP

    192:+OtAqbuUWLRMks+MB3+ZdJIrP/NGP1hYNbQPMKQrU78gmU3OO:tt1hneJG3EP1cbQPp1iUeO

Malware Config

Extracted

Family

revengerat

Botnet

Airport

C2

69.87.219.76:4040

Mutex

RV_MUTEX

Targets

    • Target

      dd203194d0ea8460ac3173e861737a77fa684e5334503867e91a70acc7f73195

    • Size

      17KB

    • MD5

      3efae209d698fc477f958bd0f9d0a9d3

    • SHA1

      466a722b0a262abb4f6fb08132814573cd5cdab5

    • SHA256

      dd203194d0ea8460ac3173e861737a77fa684e5334503867e91a70acc7f73195

    • SHA512

      c28bcabffb4b88c7e0f4e7a5a8da75abd8294f68ed04f67f47928608dbd9050e54591ea9f97a5a94f4076a9373792978dc09b6b10092d0d3a2093df11b612b4f

    • SSDEEP

      384:KK2mHlOxNDLQkZzvTLeNNvnbqsiyZyAZ3s2:KK2mHlOxNwAnLevOAB

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Drops startup file

MITRE ATT&CK Matrix ATT&CK v13

Tasks