General

  • Target

    6003afd05738b3354e306b4d3dd1c209

  • Size

    1.4MB

  • Sample

    240229-q1k3gabc45

  • MD5

    6003afd05738b3354e306b4d3dd1c209

  • SHA1

    80f65ed1b92535a47178787aa159c2a7a021af81

  • SHA256

    7e3e81940352c604c658547e5373308c8899b7a5815f93cfa4ae18e5539cd3ad

  • SHA512

    db4ea9be2f9ef7393e439fb461adcdae20e03021a8b255618fa5248d16059891b3314613008fdbd2d6b97931360f60a70434e8f51d8e0e5ffa5bbd77a14231e2

  • SSDEEP

    24576:Bq5TfcdHj4fmbqOw2qVS0smVkVMyvLlnhWEzKJ9TtLvgl/piakl3Jro0zQJ9TtDM:BUTsamVwxslC53akl3254

Malware Config

Targets

    • Target

      6003afd05738b3354e306b4d3dd1c209

    • Size

      1.4MB

    • MD5

      6003afd05738b3354e306b4d3dd1c209

    • SHA1

      80f65ed1b92535a47178787aa159c2a7a021af81

    • SHA256

      7e3e81940352c604c658547e5373308c8899b7a5815f93cfa4ae18e5539cd3ad

    • SHA512

      db4ea9be2f9ef7393e439fb461adcdae20e03021a8b255618fa5248d16059891b3314613008fdbd2d6b97931360f60a70434e8f51d8e0e5ffa5bbd77a14231e2

    • SSDEEP

      24576:Bq5TfcdHj4fmbqOw2qVS0smVkVMyvLlnhWEzKJ9TtLvgl/piakl3Jro0zQJ9TtDM:BUTsamVwxslC53akl3254

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Detects executables packed with Dotfuscator

    • RevengeRat Executable

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks