General

  • Target

    81c2d363ab4104654fc8a9d4672b947d1c83e521ea47d9c8f0aaf992cb39230d.exe

  • Size

    17KB

  • Sample

    240928-kabhfswckq

  • MD5

    fe90e6778bb1b2c53fed37fc7f3d1734

  • SHA1

    cd331ff53955a8eb547e3969ac72b7c9c98fa38d

  • SHA256

    81c2d363ab4104654fc8a9d4672b947d1c83e521ea47d9c8f0aaf992cb39230d

  • SHA512

    c769c19815effddae08e22284bce90e8585596c8aa0f994ca18fecc2cc85788d574cc1ccc13bfe67940d285ad9d43f97e0870a977e54e2bd85aeefbd5b0d3fef

  • SSDEEP

    384:Bwyay9fluycyoykf/uJJqeioELeNsvnbqsVKHyoZ3s2:Oyay9fluycyoyMCJqRLe2OdB

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

jasonbrody2019.hopto.org:5555

Mutex

RV_MUTEX

Targets

    • Target

      81c2d363ab4104654fc8a9d4672b947d1c83e521ea47d9c8f0aaf992cb39230d.exe

    • Size

      17KB

    • MD5

      fe90e6778bb1b2c53fed37fc7f3d1734

    • SHA1

      cd331ff53955a8eb547e3969ac72b7c9c98fa38d

    • SHA256

      81c2d363ab4104654fc8a9d4672b947d1c83e521ea47d9c8f0aaf992cb39230d

    • SHA512

      c769c19815effddae08e22284bce90e8585596c8aa0f994ca18fecc2cc85788d574cc1ccc13bfe67940d285ad9d43f97e0870a977e54e2bd85aeefbd5b0d3fef

    • SSDEEP

      384:Bwyay9fluycyoykf/uJJqeioELeNsvnbqsVKHyoZ3s2:Oyay9fluycyoyMCJqRLe2OdB

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks