General

  • Target

    win.exe

  • Size

    21KB

  • Sample

    240507-n48xlaeg8w

  • MD5

    bc8e22ec9436819dfb6a581c1b106ce6

  • SHA1

    a7320722aed02d6671fe08c8b9951f1fd14b4b23

  • SHA256

    3d579a26aaa523f141c22cf94f00dd27163fda2ecbb724c2962bdff4d5b2838f

  • SHA512

    c59387c6cb2f44e10dccc1f882008bf18aaebfc7931a434a5892d6717d3b5fd65c9a5cf3ab30d6c2b31a5165c53d8dfa0f5991a2415a1566fd409d26f8a15b8c

  • SSDEEP

    384:kLNzO2fP3ZiQqoZYddYtvihtYBlX7KeLTMfspTSms6Aj:yNFikZYdYvqtYCblt

Malware Config

Extracted

Family

revengerat

Botnet

LimeBuilder

C2

chutiyahaitu.duckdns.org:8080

Mutex

RV_MUTEX-FZMONFueOciq

Targets

    • Target

      win.exe

    • Size

      21KB

    • MD5

      bc8e22ec9436819dfb6a581c1b106ce6

    • SHA1

      a7320722aed02d6671fe08c8b9951f1fd14b4b23

    • SHA256

      3d579a26aaa523f141c22cf94f00dd27163fda2ecbb724c2962bdff4d5b2838f

    • SHA512

      c59387c6cb2f44e10dccc1f882008bf18aaebfc7931a434a5892d6717d3b5fd65c9a5cf3ab30d6c2b31a5165c53d8dfa0f5991a2415a1566fd409d26f8a15b8c

    • SSDEEP

      384:kLNzO2fP3ZiQqoZYddYtvihtYBlX7KeLTMfspTSms6Aj:yNFikZYdYvqtYCblt

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks