General

  • Target

    09cafa6cec63326423dd05dd90684f67

  • Size

    143KB

  • Sample

    231225-gnyclaafgm

  • MD5

    09cafa6cec63326423dd05dd90684f67

  • SHA1

    e8ef35d3b19d73e103641195886f1212e6bc864d

  • SHA256

    2fa8c8425693686649e715cde91209d63b2e1951f2702829ff867a506bdb84a5

  • SHA512

    d086f098c4dc0c32bf0d461ac282d07636b223260d568c7d27867c4b8d5a06575c5fc6fcd779dc68bf0eac7c7b3867faa79d37d7611d095e91d6960b23be03d4

  • SSDEEP

    3072:IqiKI8YeJTaCpGJua4lhKP2txYHO3hwk42B9r:I4JJGCA2fKPnrkR

Malware Config

Targets

    • Target

      09cafa6cec63326423dd05dd90684f67

    • Size

      143KB

    • MD5

      09cafa6cec63326423dd05dd90684f67

    • SHA1

      e8ef35d3b19d73e103641195886f1212e6bc864d

    • SHA256

      2fa8c8425693686649e715cde91209d63b2e1951f2702829ff867a506bdb84a5

    • SHA512

      d086f098c4dc0c32bf0d461ac282d07636b223260d568c7d27867c4b8d5a06575c5fc6fcd779dc68bf0eac7c7b3867faa79d37d7611d095e91d6960b23be03d4

    • SSDEEP

      3072:IqiKI8YeJTaCpGJua4lhKP2txYHO3hwk42B9r:I4JJGCA2fKPnrkR

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks