General

  • Target

    67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806

  • Size

    17KB

  • Sample

    240913-m69q8syfjm

  • MD5

    dad6ae572c374b1398e8724d7932a053

  • SHA1

    f4754995c504ec70262969c8037748f32abb6939

  • SHA256

    67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806

  • SHA512

    6f443c28d103046244ddac88ba5757606d483cd3630292d36a79182d4b0791a96802f121df2ea6411ba654c1178685a769f7b1c3dd128f3e7deb240a27bb0666

  • SSDEEP

    384:opQVi+nOWfyvvRPJnM2flcZ0mbaajbAsV/wyOIO2stn4:opQViwOWfils0mbi1D2Y4

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

127.0.0.1:333

Mutex

RV_MUTEX

Targets

    • Target

      67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806

    • Size

      17KB

    • MD5

      dad6ae572c374b1398e8724d7932a053

    • SHA1

      f4754995c504ec70262969c8037748f32abb6939

    • SHA256

      67975b21c4377c829cb0ff7788e82fbc44f56beef971c588cbf1e75f44eca806

    • SHA512

      6f443c28d103046244ddac88ba5757606d483cd3630292d36a79182d4b0791a96802f121df2ea6411ba654c1178685a769f7b1c3dd128f3e7deb240a27bb0666

    • SSDEEP

      384:opQVi+nOWfyvvRPJnM2flcZ0mbaajbAsV/wyOIO2stn4:opQViwOWfils0mbi1D2Y4

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks