General

  • Target

    Browser Antidetect x15.2.zip

  • Size

    79.7MB

  • Sample

    250103-bqf87swqcq

  • MD5

    9c5be400580e4145c8fa6e35e42595cf

  • SHA1

    2ee27b2fda6aa55d40af3c4d800bea0ed78d8833

  • SHA256

    a9b2aecd74b8e1c87a278dda34e1b93f0535fc64006c5c9511472422301ca389

  • SHA512

    761f245510c5abee19535e4c9caa1071606c2027018a3660b9434b2a4f798447e71e8d00f2b545b6d76ff890bb1b02b58bedef9db397fd4ca9f949246ce271b9

  • SSDEEP

    1572864:N4Yev8eXAYwD+YWopdm2cz3dtjJ9cUoWzLNvRQ5ENNfTv3YRiofpIcOtREi:NUE9HCYWUUz3Jm8LdRt0RnfpIDtRf

Malware Config

Extracted

Family

revengerat

Botnet

NYAN-CAT

C2

blog.capeturk.com:1111

Mutex

RV_MUTEX-FZMONFueOciq

Targets

    • Target

      Browser Antidetect x15.2.zip

    • Size

      79.7MB

    • MD5

      9c5be400580e4145c8fa6e35e42595cf

    • SHA1

      2ee27b2fda6aa55d40af3c4d800bea0ed78d8833

    • SHA256

      a9b2aecd74b8e1c87a278dda34e1b93f0535fc64006c5c9511472422301ca389

    • SHA512

      761f245510c5abee19535e4c9caa1071606c2027018a3660b9434b2a4f798447e71e8d00f2b545b6d76ff890bb1b02b58bedef9db397fd4ca9f949246ce271b9

    • SSDEEP

      1572864:N4Yev8eXAYwD+YWopdm2cz3dtjJ9cUoWzLNvRQ5ENNfTv3YRiofpIcOtREi:NUE9HCYWUUz3Jm8LdRt0RnfpIDtRf

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Target

      Password.txt

    • Size

      79B

    • MD5

      2e0a168682fadf1654cb2068cf326d51

    • SHA1

      36c61dafe8a7134614f94e047781b1938163050e

    • SHA256

      883b28febe1e0fbe99cc3b085b7ccdaa840609566026718775c547085f4e8fa0

    • SHA512

      2d07c3737d09d7b92e4760018bd499050e30cef3a8fdd2c3ce4236b9183e3f50346f693fb3aa4f940028a42f6fdb643ba9b655df44d11d56b12ca368b617304c

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks