General

  • Target

    court.bat

  • Size

    3KB

  • Sample

    241207-3fvgmazma1

  • MD5

    8f552193a9634e5212ba7fc7f23dc54a

  • SHA1

    6ee0c655994ae65693caf05ef2f8ae98b22e9742

  • SHA256

    23b816ce9fd19977c9760a94e258b9631ce9c79c3705f9190cbe22c00f421877

  • SHA512

    a3017ae55f9451b22c03066e0cc4ba74411228501b5d789c8ab813b2a092e26f4d3636b1759d56949ed7d1ea8355593224b9c6cc3dd5707219d9ec4c915669c3

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

0.tcp.ngrok.io:19521

Mutex

RV_MUTEX

Targets

    • Target

      court.bat

    • Size

      3KB

    • MD5

      8f552193a9634e5212ba7fc7f23dc54a

    • SHA1

      6ee0c655994ae65693caf05ef2f8ae98b22e9742

    • SHA256

      23b816ce9fd19977c9760a94e258b9631ce9c79c3705f9190cbe22c00f421877

    • SHA512

      a3017ae55f9451b22c03066e0cc4ba74411228501b5d789c8ab813b2a092e26f4d3636b1759d56949ed7d1ea8355593224b9c6cc3dd5707219d9ec4c915669c3

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • UAC bypass

    • RevengeRat Executable

    • Downloads MZ/PE file

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks