General

  • Target

    Client.exe

  • Size

    109KB

  • Sample

    241012-hj451stakq

  • MD5

    72292b69bc9a8b6191cd4f83db9b8598

  • SHA1

    944c73806a03a3eeaabab1ece053710ee613e1f9

  • SHA256

    5d6d839926cf744de37b09441d7923ee3743f52bab93760ba9a95319056b3897

  • SHA512

    ee1365626a806687cda20a8654e151fe92b4a78512ea97941aa9875ad8775c47ee6631c828739d6c72be7bf5fe547332084488ef964feeb45dec6507f5e67ccf

  • SSDEEP

    1536:i1hDv5wFD0+HV2LDdEB/u/RdbVRX37jBqagD3tSYqkXDl+:2gD0+HV2HOBQRdb3jm9SYq4l+

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

Pizd11337-26540.portmap.host:26540

Mutex

RV_MUTEX

Targets

    • Target

      Client.exe

    • Size

      109KB

    • MD5

      72292b69bc9a8b6191cd4f83db9b8598

    • SHA1

      944c73806a03a3eeaabab1ece053710ee613e1f9

    • SHA256

      5d6d839926cf744de37b09441d7923ee3743f52bab93760ba9a95319056b3897

    • SHA512

      ee1365626a806687cda20a8654e151fe92b4a78512ea97941aa9875ad8775c47ee6631c828739d6c72be7bf5fe547332084488ef964feeb45dec6507f5e67ccf

    • SSDEEP

      1536:i1hDv5wFD0+HV2LDdEB/u/RdbVRX37jBqagD3tSYqkXDl+:2gD0+HV2HOBQRdb3jm9SYq4l+

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks