General

  • Target

    d9e64d71ca2b86d280c66726ce37f58d94bae3f2e742aeda12ba0d78c5aed3c8N.exe

  • Size

    1.4MB

  • Sample

    241231-3j4vgavney

  • MD5

    937a8e46ee801a82925cbf472022bc20

  • SHA1

    9cf88f4a7b793e20c9061952e78c937a70c7f8a9

  • SHA256

    d9e64d71ca2b86d280c66726ce37f58d94bae3f2e742aeda12ba0d78c5aed3c8

  • SHA512

    bfbddd1ade8ae06cbc785076ceac6b24dd6d82d96e770674ffd0526cc4be81ff94fd2016c92c97abc5e30783fc3ae54edb0efb9f19178125b2ecd5b591311dc2

  • SSDEEP

    24576:kq5TfcdHj4fmbO2qVEzKJ9Ttr8LnUA8WYtWYzYPVR0zQJ9TtFaLnUMvkYtWYnYPj:kUTsamSxP52YtWYzYPz5DYtWYnYPj

Malware Config

Targets

    • Target

      d9e64d71ca2b86d280c66726ce37f58d94bae3f2e742aeda12ba0d78c5aed3c8N.exe

    • Size

      1.4MB

    • MD5

      937a8e46ee801a82925cbf472022bc20

    • SHA1

      9cf88f4a7b793e20c9061952e78c937a70c7f8a9

    • SHA256

      d9e64d71ca2b86d280c66726ce37f58d94bae3f2e742aeda12ba0d78c5aed3c8

    • SHA512

      bfbddd1ade8ae06cbc785076ceac6b24dd6d82d96e770674ffd0526cc4be81ff94fd2016c92c97abc5e30783fc3ae54edb0efb9f19178125b2ecd5b591311dc2

    • SSDEEP

      24576:kq5TfcdHj4fmbO2qVEzKJ9Ttr8LnUA8WYtWYzYPVR0zQJ9TtFaLnUMvkYtWYnYPj:kUTsamSxP52YtWYzYPz5DYtWYnYPj

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks