General

  • Target

    test1.bat

  • Size

    44KB

  • Sample

    240507-3hxprsec3s

  • MD5

    4eb87786994924b6f0922de2d198085f

  • SHA1

    bfb65709f110c6a52b1cd0bb202deda5a6c063cf

  • SHA256

    f0b4d94302acde2e40613f99ae3b9e5fa2096bf021afe8e60bdb0b8c0572fb19

  • SHA512

    e967b009c960cf9c2c754a032adfcd1de1c20097bf3f91eb6f53363410cb51519d508629ef60fc0c52623828a0c30349669c6911f6119cd52c52c623c5e68fae

  • SSDEEP

    768:rsUTFqlL22oStP0EzS6VmcjsuLlHfbx/p40PE28olEdko3psw9STdbz4t:4UpA3S6V7suZHfbxms1lPdg

Malware Config

Extracted

Family

revengerat

Mutex

Targets

    • Target

      test1.bat

    • Size

      44KB

    • MD5

      4eb87786994924b6f0922de2d198085f

    • SHA1

      bfb65709f110c6a52b1cd0bb202deda5a6c063cf

    • SHA256

      f0b4d94302acde2e40613f99ae3b9e5fa2096bf021afe8e60bdb0b8c0572fb19

    • SHA512

      e967b009c960cf9c2c754a032adfcd1de1c20097bf3f91eb6f53363410cb51519d508629ef60fc0c52623828a0c30349669c6911f6119cd52c52c623c5e68fae

    • SSDEEP

      768:rsUTFqlL22oStP0EzS6VmcjsuLlHfbx/p40PE28olEdko3psw9STdbz4t:4UpA3S6V7suZHfbxms1lPdg

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks