General
-
Target
court.bat
-
Size
3KB
-
Sample
241207-3fvgmazma1
-
MD5
8f552193a9634e5212ba7fc7f23dc54a
-
SHA1
6ee0c655994ae65693caf05ef2f8ae98b22e9742
-
SHA256
23b816ce9fd19977c9760a94e258b9631ce9c79c3705f9190cbe22c00f421877
-
SHA512
a3017ae55f9451b22c03066e0cc4ba74411228501b5d789c8ab813b2a092e26f4d3636b1759d56949ed7d1ea8355593224b9c6cc3dd5707219d9ec4c915669c3
Static task
static1
Behavioral task
behavioral1
Sample
court.bat
Resource
win11-20241007-en
Malware Config
Extracted
revengerat
Guest
0.tcp.ngrok.io:19521
RV_MUTEX
Targets
-
-
Target
court.bat
-
Size
3KB
-
MD5
8f552193a9634e5212ba7fc7f23dc54a
-
SHA1
6ee0c655994ae65693caf05ef2f8ae98b22e9742
-
SHA256
23b816ce9fd19977c9760a94e258b9631ce9c79c3705f9190cbe22c00f421877
-
SHA512
a3017ae55f9451b22c03066e0cc4ba74411228501b5d789c8ab813b2a092e26f4d3636b1759d56949ed7d1ea8355593224b9c6cc3dd5707219d9ec4c915669c3
-
Revengerat family
-
RevengeRat Executable
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1