General

  • Target

    setup_nt.exe

  • Size

    78.3MB

  • Sample

    240919-ayr51a1hmm

  • MD5

    53d9920e0bc746101dda3d70e1b7b3d1

  • SHA1

    a2c8ca9bdd1398cd0b08dd4824fb8714acf3c072

  • SHA256

    a315a5023f879208dca5f5f5486c8bfc23ed13e18bac83cef13579a123532dce

  • SHA512

    660951b3bcfde545d4eff4da63eeb0d4201a9167dd954cf1ce42eb351d15d3ff21baba914254c1096488e34b57999008c23588227b840d3979608faf07aaebc6

  • SSDEEP

    1572864:/WIPn5UPrh+YnUaMRAMShUDuO69p2Xzixl3cgD5LJIqi9pV:Dn5UThvnHMRAjyDur9pcUoqYpV

Malware Config

Targets

    • Target

      setup_nt.exe

    • Size

      78.3MB

    • MD5

      53d9920e0bc746101dda3d70e1b7b3d1

    • SHA1

      a2c8ca9bdd1398cd0b08dd4824fb8714acf3c072

    • SHA256

      a315a5023f879208dca5f5f5486c8bfc23ed13e18bac83cef13579a123532dce

    • SHA512

      660951b3bcfde545d4eff4da63eeb0d4201a9167dd954cf1ce42eb351d15d3ff21baba914254c1096488e34b57999008c23588227b840d3979608faf07aaebc6

    • SSDEEP

      1572864:/WIPn5UPrh+YnUaMRAMShUDuO69p2Xzixl3cgD5LJIqi9pV:Dn5UThvnHMRAjyDur9pcUoqYpV

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks