General

  • Target

    cfd4319b50d6bfdad23a68f089b3d97dee2806360e9dee3816cc37cd2a99fe99N

  • Size

    1.3MB

  • Sample

    241110-b3p2wawkhx

  • MD5

    7942a88fb9b1069ff48db470aeef7090

  • SHA1

    ec41b9cda8700220886a1ac028709c6ae69cf93c

  • SHA256

    cfd4319b50d6bfdad23a68f089b3d97dee2806360e9dee3816cc37cd2a99fe99

  • SHA512

    0bdfd75db63f69648ce7bd5f9ee32efa030d3741dbbc23c0d81868ae3b0380b6a88b0f3109c250d740ad6fe67b65c3cd1f40a1af59c57f6f2194f77bd3649d1e

  • SSDEEP

    24576:kq5TfcdHj4fmbpD2qB+Vf3oVGUG5y6zl8O3uXWVpA4yozB11:kUTsamRxAf3oVGUGfuXYAg

Malware Config

Targets

    • Target

      cfd4319b50d6bfdad23a68f089b3d97dee2806360e9dee3816cc37cd2a99fe99N

    • Size

      1.3MB

    • MD5

      7942a88fb9b1069ff48db470aeef7090

    • SHA1

      ec41b9cda8700220886a1ac028709c6ae69cf93c

    • SHA256

      cfd4319b50d6bfdad23a68f089b3d97dee2806360e9dee3816cc37cd2a99fe99

    • SHA512

      0bdfd75db63f69648ce7bd5f9ee32efa030d3741dbbc23c0d81868ae3b0380b6a88b0f3109c250d740ad6fe67b65c3cd1f40a1af59c57f6f2194f77bd3649d1e

    • SSDEEP

      24576:kq5TfcdHj4fmbpD2qB+Vf3oVGUG5y6zl8O3uXWVpA4yozB11:kUTsamRxAf3oVGUGfuXYAg

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks