General
-
Target
AndroidEmulator.exe
-
Size
180KB
-
Sample
241209-3lvdtavrfy
-
MD5
9e55624e81cc5bf9f40792a97c5e3c9b
-
SHA1
35379afa47748f022e4f23d5a499ea01e251a88b
-
SHA256
88a0c5df4f8874254aedfe226c8e01756ac1ffc4d6e40360f70e42fc8fbe2b27
-
SHA512
bac780817e166dc8203f35bd34da289b583b1cb27c26dbe38c70beb44d669949ab666ed16e6485554a2aed22a987cb5e1c6a3cf7d36d85d952d8a28808190caf
-
SSDEEP
3072:a3ZN9Ho17ad7R3zWwSHaqXQpZjl9SYtT22wjiAAAAAAARtvNEEEZTEEEEEEEEE1G:a3FH+7A7R3zWPHa5Tjn7R22wOAAAAAAP
Behavioral task
behavioral1
Sample
AndroidEmulator.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AndroidEmulator.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
revengerat
Guest
127.0.0.1:333
127.0.0.1:19472
2.tcp.eu.ngrok.io:333
2.tcp.eu.ngrok.io:19472
RV_MUTEX-RawrHJfWfhaRC
Targets
-
-
Target
AndroidEmulator.exe
-
Size
180KB
-
MD5
9e55624e81cc5bf9f40792a97c5e3c9b
-
SHA1
35379afa47748f022e4f23d5a499ea01e251a88b
-
SHA256
88a0c5df4f8874254aedfe226c8e01756ac1ffc4d6e40360f70e42fc8fbe2b27
-
SHA512
bac780817e166dc8203f35bd34da289b583b1cb27c26dbe38c70beb44d669949ab666ed16e6485554a2aed22a987cb5e1c6a3cf7d36d85d952d8a28808190caf
-
SSDEEP
3072:a3ZN9Ho17ad7R3zWwSHaqXQpZjl9SYtT22wjiAAAAAAARtvNEEEZTEEEEEEEEE1G:a3FH+7A7R3zWPHa5Tjn7R22wOAAAAAAP
Score10/10-
Revengerat family
-
RevengeRat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1