General

  • Target

    cool.exe

  • Size

    23KB

  • Sample

    240913-x4nq4avcme

  • MD5

    4b61aedaee4e3be743dbebea96f91441

  • SHA1

    448faae75b84b7dd9d66f1386f178935523a429c

  • SHA256

    d650607092d56dd7df0b19c17e0ee5fb331af3aa03cd961e70e0a34310504a62

  • SHA512

    1015e7d9476a8089d4ac5dcc0f2dc97154cbe7f05ae8990548fb23b4577cf863e11a6545df04dcca4995c7e74a6f916d55e442c8678885c1c742686688b65deb

  • SSDEEP

    384:mb+cnNzGglTgMnmrBcNFEhmisbYpGy4AVFCzYcHe+Z:mbtucjs+AV8zYcHe+Z

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

127.0.0.1:1604

Mutex

RV_MUTEX

Targets

    • Target

      cool.exe

    • Size

      23KB

    • MD5

      4b61aedaee4e3be743dbebea96f91441

    • SHA1

      448faae75b84b7dd9d66f1386f178935523a429c

    • SHA256

      d650607092d56dd7df0b19c17e0ee5fb331af3aa03cd961e70e0a34310504a62

    • SHA512

      1015e7d9476a8089d4ac5dcc0f2dc97154cbe7f05ae8990548fb23b4577cf863e11a6545df04dcca4995c7e74a6f916d55e442c8678885c1c742686688b65deb

    • SSDEEP

      384:mb+cnNzGglTgMnmrBcNFEhmisbYpGy4AVFCzYcHe+Z:mbtucjs+AV8zYcHe+Z

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks