General

  • Target

    343ec64d0d538a06e4f710e556721cf3daed3e0642abde48879370c86dfc4aa2.exe

  • Size

    1.4MB

  • Sample

    250117-cyhyfazmcm

  • MD5

    0e20718e7b74edcc5b2e0a555eab797f

  • SHA1

    948a2d84211e550f722e682588ee33634760e5c7

  • SHA256

    343ec64d0d538a06e4f710e556721cf3daed3e0642abde48879370c86dfc4aa2

  • SHA512

    058c7d1a99e8a44f5bfa8be2848a83480dac5313ce5ea707c5f25b43d31c4b221bcf8e5efe90049856cab09f44799ddb3b120c343f587e0801337b877d039889

  • SSDEEP

    24576:Bq5TfcdHj4fmb9Ve9y2qYmIMeYyBMLVzjrKEzKJ9TtL3/7/ij+O0zQJ9TtD5lG:BUTsamC9yxVjw53ij+252

Malware Config

Targets

    • Target

      343ec64d0d538a06e4f710e556721cf3daed3e0642abde48879370c86dfc4aa2.exe

    • Size

      1.4MB

    • MD5

      0e20718e7b74edcc5b2e0a555eab797f

    • SHA1

      948a2d84211e550f722e682588ee33634760e5c7

    • SHA256

      343ec64d0d538a06e4f710e556721cf3daed3e0642abde48879370c86dfc4aa2

    • SHA512

      058c7d1a99e8a44f5bfa8be2848a83480dac5313ce5ea707c5f25b43d31c4b221bcf8e5efe90049856cab09f44799ddb3b120c343f587e0801337b877d039889

    • SSDEEP

      24576:Bq5TfcdHj4fmb9Ve9y2qYmIMeYyBMLVzjrKEzKJ9TtL3/7/ij+O0zQJ9TtD5lG:BUTsamC9yxVjw53ij+252

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks