General

  • Target

    Client2‮COD..exe

  • Size

    467KB

  • Sample

    240913-1ne1ss1ajr

  • MD5

    69c5d667bdb0c221dbb50d3301ad1d67

  • SHA1

    c9fb83fc1cc21052a51c1e38bdaaf8b2c3653293

  • SHA256

    07af92f0d7debf7f977de61ae735a80a8c504620c61060953c963545e72d1c8d

  • SHA512

    221de0fe425d9691feb2b065e9cb02a5fad2e15b92829900a77c3728bc03ce2c329792e15dbb73378cb838c09479998f243cc7fe68bfa5abe653733fb5243798

  • SSDEEP

    3072:zV3sMJibhTsNElLD5CbwDMV9SYzAwZd7uy6W:zV30hTsNElLDzDy78w/am

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

127.0.0.1:1604

Mutex

RV_MUTEX

Targets

    • Target

      Client2‮COD..exe

    • Size

      467KB

    • MD5

      69c5d667bdb0c221dbb50d3301ad1d67

    • SHA1

      c9fb83fc1cc21052a51c1e38bdaaf8b2c3653293

    • SHA256

      07af92f0d7debf7f977de61ae735a80a8c504620c61060953c963545e72d1c8d

    • SHA512

      221de0fe425d9691feb2b065e9cb02a5fad2e15b92829900a77c3728bc03ce2c329792e15dbb73378cb838c09479998f243cc7fe68bfa5abe653733fb5243798

    • SSDEEP

      3072:zV3sMJibhTsNElLD5CbwDMV9SYzAwZd7uy6W:zV30hTsNElLDzDy78w/am

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks