General

  • Target

    291bf31470c9bcacec467c980adb7a3d111ebb6b72cf07147884a7eae5cabde9.exe

  • Size

    17KB

  • Sample

    240927-vsrbqsvelf

  • MD5

    bd86b3d43f45a0dc0ff6f9557a2fa13f

  • SHA1

    1ab9d082c409e6b5e956973e540cdc5cbe5e4160

  • SHA256

    291bf31470c9bcacec467c980adb7a3d111ebb6b72cf07147884a7eae5cabde9

  • SHA512

    058c70d976a8c6fdb363d2b3990f68acb35eb928cbfc5742ade6f5334e26039acbb171de4ec5250375012983c2659133a053a2b63fdc63a749356c016cd84dde

  • SSDEEP

    384:1dGdvf9+dUd3dNf/GJJLemoEIPJvnbisVKiy2Lu2s2:1dGdvf9+dUd3dd6JLBIRmUa2

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

192.168.234.157:4444

Mutex

RV_MUTEX

Targets

    • Target

      291bf31470c9bcacec467c980adb7a3d111ebb6b72cf07147884a7eae5cabde9.exe

    • Size

      17KB

    • MD5

      bd86b3d43f45a0dc0ff6f9557a2fa13f

    • SHA1

      1ab9d082c409e6b5e956973e540cdc5cbe5e4160

    • SHA256

      291bf31470c9bcacec467c980adb7a3d111ebb6b72cf07147884a7eae5cabde9

    • SHA512

      058c70d976a8c6fdb363d2b3990f68acb35eb928cbfc5742ade6f5334e26039acbb171de4ec5250375012983c2659133a053a2b63fdc63a749356c016cd84dde

    • SSDEEP

      384:1dGdvf9+dUd3dNf/GJJLemoEIPJvnbisVKiy2Lu2s2:1dGdvf9+dUd3dd6JLBIRmUa2

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks