General

  • Target

    Client‮4PM..exe

  • Size

    467KB

  • Sample

    240913-1ke7dszgqk

  • MD5

    b46e938e455f07908b277bacaf40c1b8

  • SHA1

    10b0d817957340cf35df3b20a37a14ec12ccf34a

  • SHA256

    a621f7d758f70c986ebc40d2e9ad89187a4659f1e26ae33af6b19557c0074038

  • SHA512

    965da90a55b382b78e385e20f1714541ac64b2c9e62605cf0b14513d21a5e181b6def0e9df04f74cb55759b070a399c5593142476da15358cdf022d1b00eb8c7

  • SSDEEP

    3072:md3MwOibhTsNElLD5CbwDa9SY4AwZB7uy6W:md3BhTsNElLDzD+7PwTam

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

127.0.0.1:333

Mutex

RV_MUTEX

Targets

    • Target

      Client‮4PM..exe

    • Size

      467KB

    • MD5

      b46e938e455f07908b277bacaf40c1b8

    • SHA1

      10b0d817957340cf35df3b20a37a14ec12ccf34a

    • SHA256

      a621f7d758f70c986ebc40d2e9ad89187a4659f1e26ae33af6b19557c0074038

    • SHA512

      965da90a55b382b78e385e20f1714541ac64b2c9e62605cf0b14513d21a5e181b6def0e9df04f74cb55759b070a399c5593142476da15358cdf022d1b00eb8c7

    • SSDEEP

      3072:md3MwOibhTsNElLD5CbwDa9SY4AwZB7uy6W:md3BhTsNElLDzD+7PwTam

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks