General
-
Target
37626322_1871171556512529_4700140521996156928_n.jpg
-
Size
62KB
-
Sample
240921-pcnm1s1erb
-
MD5
fb2e01e7199ecdeae00c5764a4005ed5
-
SHA1
2387cbd2f3ad41e2596dfb987baf65ae3b229db3
-
SHA256
bab52efb1c11cba17e9ae78fdb51c2d8c825af93538eee05b12b2e30b8a0d6e2
-
SHA512
2b959bfe22e321db451b6f1681880ceda9d6ef660547ef0601feb442d6bb1079377cd4da782821428a23931480e668685ab9058ee6945a41f53a95986f5d2794
-
SSDEEP
1536:cRF5Wepb57lB9oqjVTs5sTkxO+VWhLVIB4kd+Wes1LLOsqBMQ:c9Ws5f9JSBWRVIB4cMspL7Q
Static task
static1
Behavioral task
behavioral1
Sample
37626322_1871171556512529_4700140521996156928_n.jpg
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37626322_1871171556512529_4700140521996156928_n.jpg
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
37626322_1871171556512529_4700140521996156928_n.jpg
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
37626322_1871171556512529_4700140521996156928_n.jpg
Resource
win11-20240802-en
Malware Config
Extracted
revengerat
Guest
0.tcp.ngrok.io:19521
RV_MUTEX
Targets
-
-
Target
37626322_1871171556512529_4700140521996156928_n.jpg
-
Size
62KB
-
MD5
fb2e01e7199ecdeae00c5764a4005ed5
-
SHA1
2387cbd2f3ad41e2596dfb987baf65ae3b229db3
-
SHA256
bab52efb1c11cba17e9ae78fdb51c2d8c825af93538eee05b12b2e30b8a0d6e2
-
SHA512
2b959bfe22e321db451b6f1681880ceda9d6ef660547ef0601feb442d6bb1079377cd4da782821428a23931480e668685ab9058ee6945a41f53a95986f5d2794
-
SSDEEP
1536:cRF5Wepb57lB9oqjVTs5sTkxO+VWhLVIB4kd+Wes1LLOsqBMQ:c9Ws5f9JSBWRVIB4cMspL7Q
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
RevengeRat Executable
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Disables use of System Restore points
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Modifies file permissions
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Scripting
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1File and Directory Permissions Modification
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
8Scripting
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1