General

  • Target

    Reserva.xls

  • Size

    754KB

  • Sample

    231207-jfge8abea4

  • MD5

    3bcf5f59bf2674ed3d5873037e6facf9

  • SHA1

    c30056cf0d3d6d484bc70d90e25797d314ad130d

  • SHA256

    23a43356377f3202cc3dfc099e0966881e4069d7159ff7f8c8ea5638ecb93ae7

  • SHA512

    fa3a9d4ee97a6a8f9d23bb17c2b466db85c01b0837f45c0150d35053db9616fc68d23e0ec09b3f3e6a5729c633496c8031ad208df71b2b679d8bbfcd1610787e

  • SSDEEP

    12288:JoPIj/NtKmSvwtfNsHv38KHa1eYNqscnYwclMZWeVQOgiHviwa4cekHW:wIT6uNsHv3shPcnY5uZN++HKwnAW

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

marcelotatuape.ddns.net:333

Mutex

da4b271c7cfc4bb

Targets

    • Target

      Reserva.xls

    • Size

      754KB

    • MD5

      3bcf5f59bf2674ed3d5873037e6facf9

    • SHA1

      c30056cf0d3d6d484bc70d90e25797d314ad130d

    • SHA256

      23a43356377f3202cc3dfc099e0966881e4069d7159ff7f8c8ea5638ecb93ae7

    • SHA512

      fa3a9d4ee97a6a8f9d23bb17c2b466db85c01b0837f45c0150d35053db9616fc68d23e0ec09b3f3e6a5729c633496c8031ad208df71b2b679d8bbfcd1610787e

    • SSDEEP

      12288:JoPIj/NtKmSvwtfNsHv38KHa1eYNqscnYwclMZWeVQOgiHviwa4cekHW:wIT6uNsHv3shPcnY5uZN++HKwnAW

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Remote System Discovery

1
T1018

Tasks