General

  • Target

    test.exe

  • Size

    24KB

  • Sample

    250314-299b7s1tet

  • MD5

    a226efb28f312fe033e65bd6a69f6984

  • SHA1

    f6b6ff14ef481d6790e0e2815a91f9504b003cd3

  • SHA256

    7a2b24e85d1ee137e9b96d8ca987cb90d2fc49f0f10906cde870bb0ee3a0bfed

  • SHA512

    8128fdf9c2900566b2f17c6e3719a600f5ac8878715c6d7694c4623ee873d783c38b45eb63c368b3aa4bab311fadf01d2bc7cb775ae7a295e9e2afdaa1d3aa4a

  • SSDEEP

    384:eU0ZVrMYSvRPJnMHYaA1WNbIBj3GNgylu9MZxe1sbYp7v1yRiflGeCzYcHe+Z:eZV59E3CVu9DMitG/zYcHe+Z

Malware Config

Extracted

Family

revengerat

Botnet

test

C2

127.0.0.1:333

127.0.0.1:21

127.0.0.1:443

127.0.0.1:80

212.102.63.147:333

212.102.63.147:21

212.102.63.147:443

212.102.63.147:80

Mutex

RV_MUTEX-fawrHJfWfhaR

Targets

    • Target

      test.exe

    • Size

      24KB

    • MD5

      a226efb28f312fe033e65bd6a69f6984

    • SHA1

      f6b6ff14ef481d6790e0e2815a91f9504b003cd3

    • SHA256

      7a2b24e85d1ee137e9b96d8ca987cb90d2fc49f0f10906cde870bb0ee3a0bfed

    • SHA512

      8128fdf9c2900566b2f17c6e3719a600f5ac8878715c6d7694c4623ee873d783c38b45eb63c368b3aa4bab311fadf01d2bc7cb775ae7a295e9e2afdaa1d3aa4a

    • SSDEEP

      384:eU0ZVrMYSvRPJnMHYaA1WNbIBj3GNgylu9MZxe1sbYp7v1yRiflGeCzYcHe+Z:eZV59E3CVu9DMitG/zYcHe+Z

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • RevengeRat Executable

    • Drops startup file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks