General

  • Target

    c6f541377263694b92f3f6d72de7fb17

  • Size

    56KB

  • Sample

    240313-1v8axsac5z

  • MD5

    c6f541377263694b92f3f6d72de7fb17

  • SHA1

    3fa80edb1e9d07afab32c45c19a2997c154b4a55

  • SHA256

    2f254906129ccf4a7f769a41252699f3865202dbd4484aac4ea957f08d3fa3d6

  • SHA512

    af81cdf8d211ba33b782f48f62ae37241acc703ff522e3c9cc916fa4cbd357f6bd32896ea79a134409cd2f52df8ec73b2634ed60f728dde8c83bb6cd3a118798

  • SSDEEP

    768:4OGoLGlaB2HyuJOIyVvsBWXuIsegP2j7RhgDQHorUkgZU++NNPqtUA2TVzYcHe+Z:Ioyll9OIyscX5sen7RQTYknVNPqtR+

Malware Config

Targets

    • Target

      c6f541377263694b92f3f6d72de7fb17

    • Size

      56KB

    • MD5

      c6f541377263694b92f3f6d72de7fb17

    • SHA1

      3fa80edb1e9d07afab32c45c19a2997c154b4a55

    • SHA256

      2f254906129ccf4a7f769a41252699f3865202dbd4484aac4ea957f08d3fa3d6

    • SHA512

      af81cdf8d211ba33b782f48f62ae37241acc703ff522e3c9cc916fa4cbd357f6bd32896ea79a134409cd2f52df8ec73b2634ed60f728dde8c83bb6cd3a118798

    • SSDEEP

      768:4OGoLGlaB2HyuJOIyVvsBWXuIsegP2j7RhgDQHorUkgZU++NNPqtUA2TVzYcHe+Z:Ioyll9OIyscX5sen7RQTYknVNPqtR+

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks