General

  • Target

    329ba7b3d422b55889ad08de0d6d2a19531a5770dce7e2db6e4781a10db8e9d6N.exe

  • Size

    1.4MB

  • Sample

    241205-n3j7vazjdr

  • MD5

    d06e99383a064f221c012f7b8d2d3d20

  • SHA1

    71b51d5366a6272564e6605f2014444bbfed3ff8

  • SHA256

    329ba7b3d422b55889ad08de0d6d2a19531a5770dce7e2db6e4781a10db8e9d6

  • SHA512

    bad76b2fd856cd36c5e6c57ba2c441ad0d9c6e38824eee914101d51f637c0aca0093a8b46658ff27a7a27e8a5608dfe8dc2e293ab536d171bf735fa7ee639df7

  • SSDEEP

    24576:kq5TfcdHj4fmb9Ve9l2qEK26wQzLMnUAFFIfHWEzKJ9TtrWgXiFurFtW0zQJ9TtQ:kUTsamC9lx6FB5lFI5Q

Malware Config

Targets

    • Target

      329ba7b3d422b55889ad08de0d6d2a19531a5770dce7e2db6e4781a10db8e9d6N.exe

    • Size

      1.4MB

    • MD5

      d06e99383a064f221c012f7b8d2d3d20

    • SHA1

      71b51d5366a6272564e6605f2014444bbfed3ff8

    • SHA256

      329ba7b3d422b55889ad08de0d6d2a19531a5770dce7e2db6e4781a10db8e9d6

    • SHA512

      bad76b2fd856cd36c5e6c57ba2c441ad0d9c6e38824eee914101d51f637c0aca0093a8b46658ff27a7a27e8a5608dfe8dc2e293ab536d171bf735fa7ee639df7

    • SSDEEP

      24576:kq5TfcdHj4fmb9Ve9l2qEK26wQzLMnUAFFIfHWEzKJ9TtrWgXiFurFtW0zQJ9TtQ:kUTsamC9lx6FB5lFI5Q

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks