General

  • Target

    97ebba20193617551f93bd14d03b37c616a385b3e2a8f3ec5f3c5348a98f75d4

  • Size

    1.4MB

  • Sample

    240319-2tgx1sad8y

  • MD5

    39ea22af539d7a3e3e33df71f1c7f48c

  • SHA1

    8035e9dc9ed7abb2fa6131b81818f4f252cb4fe7

  • SHA256

    97ebba20193617551f93bd14d03b37c616a385b3e2a8f3ec5f3c5348a98f75d4

  • SHA512

    26f4477eeab06db03a0406a04c815babc25a30044a68bedcab1b15b24ed6d8895121634976bb661bfff199ee2cd9ca0c5538d88c04a43bf7ab207d1e44bf23a4

  • SSDEEP

    24576:1q5TfcdHj4fmb9Ve982q6CIMeYyBMLL0oj+CWEzKJ9Ttr8J1lj2XW0zQJ9TtFiGF:1UTsamC98x1je5klj2e5H

Malware Config

Targets

    • Target

      97ebba20193617551f93bd14d03b37c616a385b3e2a8f3ec5f3c5348a98f75d4

    • Size

      1.4MB

    • MD5

      39ea22af539d7a3e3e33df71f1c7f48c

    • SHA1

      8035e9dc9ed7abb2fa6131b81818f4f252cb4fe7

    • SHA256

      97ebba20193617551f93bd14d03b37c616a385b3e2a8f3ec5f3c5348a98f75d4

    • SHA512

      26f4477eeab06db03a0406a04c815babc25a30044a68bedcab1b15b24ed6d8895121634976bb661bfff199ee2cd9ca0c5538d88c04a43bf7ab207d1e44bf23a4

    • SSDEEP

      24576:1q5TfcdHj4fmb9Ve982q6CIMeYyBMLL0oj+CWEzKJ9Ttr8J1lj2XW0zQJ9TtFiGF:1UTsamC98x1je5klj2e5H

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Detects executables packed with Dotfuscator

    • RevengeRat Executable

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks