General

  • Target

    bee0b629d62b22ded860f4b4b727aa82

  • Size

    336KB

  • Sample

    240310-r6ecjseg33

  • MD5

    bee0b629d62b22ded860f4b4b727aa82

  • SHA1

    41dfd94bb6fc44517b8bf54f0df18f75d6532ffa

  • SHA256

    14a5d98a762dc78113a0a642820b7fa2fc7ff86805d1dcc1d05230de717124d2

  • SHA512

    4fd5aa0fe69133a045e62b88adb301f07436f1275cdfa14d2bf97ece74f8104c67103421a16edad8b9964669f6ff6fefa24e4a06c5f147f3cc0d4b2350f090e8

  • SSDEEP

    6144:kJRMksaJX+krFD+4taWKQRO3ORNeHEhmI0fEJI5IXJbeT/PhBSY:SMkT5+krFDar7MmI0fEJdaT/PhsY

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

dontreachme.duckdns.org:3602

Mutex

774d753e6b8d42

Targets

    • Target

      bee0b629d62b22ded860f4b4b727aa82

    • Size

      336KB

    • MD5

      bee0b629d62b22ded860f4b4b727aa82

    • SHA1

      41dfd94bb6fc44517b8bf54f0df18f75d6532ffa

    • SHA256

      14a5d98a762dc78113a0a642820b7fa2fc7ff86805d1dcc1d05230de717124d2

    • SHA512

      4fd5aa0fe69133a045e62b88adb301f07436f1275cdfa14d2bf97ece74f8104c67103421a16edad8b9964669f6ff6fefa24e4a06c5f147f3cc0d4b2350f090e8

    • SSDEEP

      6144:kJRMksaJX+krFD+4taWKQRO3ORNeHEhmI0fEJI5IXJbeT/PhBSY:SMkT5+krFDar7MmI0fEJdaT/PhsY

    • Detect ZGRat V1

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks