General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/RAT/NJRat.exe

  • Sample

    241013-srzwdatbkc

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

0.tcp.ngrok.io:19521

Mutex

RV_MUTEX

Targets

    • Target

      https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/RAT/NJRat.exe

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks