General

  • Target

    client.exe

  • Size

    503KB

  • Sample

    250318-e1t5laxqy9

  • MD5

    18027ab757117250f63fd4cecfb17554

  • SHA1

    780bc94badbc0d1beb029c60e9023afc0351d265

  • SHA256

    8176ff71185aa68a3d034ee352edb744808cc1c0c8b17ec188b0e0a87ec3d66f

  • SHA512

    9b724169672519ada3730540e50cb0979d9f3db06e95aafb785ba713f04dd3108d05872f8acc11d72c51990e4f6084325d03bc866fff5979e18edc462cb20218

  • SSDEEP

    12288:Hnh3gCeDX0PfUC2jykOJQVB3z6Lm//HFl2Qc7kc:HnTZNGB2LmGV7kc

Malware Config

Extracted

Family

revengerat

Botnet

retard

C2

127.0.0.1:333

127.0.0.1:21

127.0.0.1:443

127.0.0.1:80

212.102.63.147:333

212.102.63.147:21

212.102.63.147:443

212.102.63.147:80

Mutex

RV_MUTEX-TwUnoWrUUgHRH

Targets

    • Target

      client.exe

    • Size

      503KB

    • MD5

      18027ab757117250f63fd4cecfb17554

    • SHA1

      780bc94badbc0d1beb029c60e9023afc0351d265

    • SHA256

      8176ff71185aa68a3d034ee352edb744808cc1c0c8b17ec188b0e0a87ec3d66f

    • SHA512

      9b724169672519ada3730540e50cb0979d9f3db06e95aafb785ba713f04dd3108d05872f8acc11d72c51990e4f6084325d03bc866fff5979e18edc462cb20218

    • SSDEEP

      12288:Hnh3gCeDX0PfUC2jykOJQVB3z6Lm//HFl2Qc7kc:HnTZNGB2LmGV7kc

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks