Resubmissions

13-01-2025 20:29

250113-y9mawswray 10

13-01-2025 20:26

250113-y76azsyqcn 10

General

  • Target

    https://gofile.io/d/nEXvhI

  • Sample

    250113-y76azsyqcn

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

0.tcp.ngrok.io:19521

Mutex

RV_MUTEX

Targets

    • Target

      https://gofile.io/d/nEXvhI

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • RevengeRat Executable

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks