General

  • Target

    a648209a4af3bc3253ec4d3e189b349e

  • Size

    196KB

  • Sample

    240226-n1awdsch47

  • MD5

    a648209a4af3bc3253ec4d3e189b349e

  • SHA1

    ddbafd73f5da7d4249b05a4db77995bcb8788f3f

  • SHA256

    2e1b8f4394191bd190458f660be8d7e7199c5bb6aeadc2cd18b2cc09dcddf338

  • SHA512

    43f4233502a0d3dffdfe21eb0c8e7449daef9e485148be08963fa6e809fa36c2a97e2669ca044a38ff5e1af9a54e324d56117de5a1fd33fd91b5943fceeb77bd

  • SSDEEP

    3072:U9Y/6ogy9pYlZdVqVwVWyGgJJpLXDYbGljNPB7VYOY1dZaioWEZHoj4slffd75fu:U963gy9pYlMVwGbONPBuO4DaiLyHSB5

Malware Config

Targets

    • Target

      a648209a4af3bc3253ec4d3e189b349e

    • Size

      196KB

    • MD5

      a648209a4af3bc3253ec4d3e189b349e

    • SHA1

      ddbafd73f5da7d4249b05a4db77995bcb8788f3f

    • SHA256

      2e1b8f4394191bd190458f660be8d7e7199c5bb6aeadc2cd18b2cc09dcddf338

    • SHA512

      43f4233502a0d3dffdfe21eb0c8e7449daef9e485148be08963fa6e809fa36c2a97e2669ca044a38ff5e1af9a54e324d56117de5a1fd33fd91b5943fceeb77bd

    • SSDEEP

      3072:U9Y/6ogy9pYlZdVqVwVWyGgJJpLXDYbGljNPB7VYOY1dZaioWEZHoj4slffd75fu:U963gy9pYlMVwGbONPBuO4DaiLyHSB5

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks