Resubmissions

20/04/2025, 00:10 UTC

250420-agcc8axyax 10

16/04/2025, 11:04 UTC

250416-m58gsaz1ay 10

15/04/2025, 17:34 UTC

250415-v5ylksypw9 10

15/04/2025, 06:16 UTC

250415-g1p7ras1dw 10

14/04/2025, 08:06 UTC

250414-jzpwpstxhx 10

14/04/2025, 07:59 UTC

250414-jvg1assky4 10

14/04/2025, 07:22 UTC

250414-h7g1dss1h1 10

Analysis

  • max time kernel
    131s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2025, 21:39 UTC

General

  • Target

    948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe

  • Size

    17KB

  • MD5

    aa0a434f00c138ef445bf89493a6d731

  • SHA1

    2e798c079b179b736247cf20d1346657db9632c7

  • SHA256

    948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654

  • SHA512

    e5b50ccd82c9cd5797dfc278dbd4bef6b4cb4468424962666d2618707a3c69e0154e8fb11846e0f529dd6e903fd9de2a2f4dd3b526821b10f08530371a0c6952

  • SSDEEP

    384:rnhZ7/5eOHY9FmMoEIPJvnbisVK8ysLu2s2:bhdQOS8EIRmIa2

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe
    "C:\Users\Admin\AppData\Local\Temp\948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Users\Admin\AppData\Roaming\Client.exe
      "C:\Users\Admin\AppData\Roaming\Client.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      PID:4704
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Client.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Users\Admin\AppData\Roaming\Client.exe
      C:\Users\Admin\AppData\Roaming\Client.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2236

Network

  • flag-us
    DNS
    cocohack.dtdns.net
    Client.exe
    Remote address:
    8.8.8.8:53
    Request
    cocohack.dtdns.net
    IN A
    Response
    cocohack.dtdns.net
    IN A
    3.33.243.145
  • flag-us
    DNS
    c.pki.goog
    Remote address:
    8.8.8.8:53
    Request
    c.pki.goog
    IN A
    Response
    c.pki.goog
    IN CNAME
    pki-goog.l.google.com
    pki-goog.l.google.com
    IN A
    142.250.180.3
  • flag-gb
    GET
    http://c.pki.goog/r/r1.crl
    Remote address:
    142.250.180.3:80
    Request
    GET /r/r1.crl HTTP/1.1
    Cache-Control: max-age = 3000
    Connection: Keep-Alive
    Accept: */*
    If-Modified-Since: Thu, 03 Apr 2025 14:18:00 GMT
    User-Agent: Microsoft-CryptoAPI/10.0
    Host: c.pki.goog
    Response
    HTTP/1.1 304 Not Modified
    Date: Fri, 11 Apr 2025 21:35:47 GMT
    Expires: Fri, 11 Apr 2025 22:25:47 GMT
    Age: 383
    Last-Modified: Thu, 03 Apr 2025 14:18:00 GMT
    Cache-Control: public, max-age=3000
    Vary: Accept-Encoding
  • 3.33.243.145:84
    cocohack.dtdns.net
    948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe
    260 B
    5
  • 3.33.243.145:84
    cocohack.dtdns.net
    948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe
    208 B
    4
  • 3.33.243.145:84
    cocohack.dtdns.net
    Client.exe
    260 B
    5
  • 142.250.180.3:80
    http://c.pki.goog/r/r1.crl
    http
    384 B
    354 B
    4
    3

    HTTP Request

    GET http://c.pki.goog/r/r1.crl

    HTTP Response

    304
  • 3.33.243.145:84
    cocohack.dtdns.net
    Client.exe
    260 B
    5
  • 3.33.243.145:84
    cocohack.dtdns.net
    Client.exe
    260 B
    5
  • 3.33.243.145:84
    cocohack.dtdns.net
    Client.exe
    260 B
    5
  • 3.33.243.145:84
    cocohack.dtdns.net
    Client.exe
    260 B
    5
  • 8.8.8.8:53
    cocohack.dtdns.net
    dns
    Client.exe
    64 B
    80 B
    1
    1

    DNS Request

    cocohack.dtdns.net

    DNS Response

    3.33.243.145

  • 8.8.8.8:53
    c.pki.goog
    dns
    56 B
    107 B
    1
    1

    DNS Request

    c.pki.goog

    DNS Response

    142.250.180.3

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Client.exe

    Filesize

    17KB

    MD5

    aa0a434f00c138ef445bf89493a6d731

    SHA1

    2e798c079b179b736247cf20d1346657db9632c7

    SHA256

    948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654

    SHA512

    e5b50ccd82c9cd5797dfc278dbd4bef6b4cb4468424962666d2618707a3c69e0154e8fb11846e0f529dd6e903fd9de2a2f4dd3b526821b10f08530371a0c6952

  • memory/1140-6-0x00007FFFA4545000-0x00007FFFA4546000-memory.dmp

    Filesize

    4KB

  • memory/1140-1-0x000000001C130000-0x000000001C5FE000-memory.dmp

    Filesize

    4.8MB

  • memory/1140-2-0x000000001C600000-0x000000001C6A6000-memory.dmp

    Filesize

    664KB

  • memory/1140-4-0x000000001C790000-0x000000001C7F2000-memory.dmp

    Filesize

    392KB

  • memory/1140-5-0x00007FFFA4290000-0x00007FFFA4C31000-memory.dmp

    Filesize

    9.6MB

  • memory/1140-0-0x00007FFFA4545000-0x00007FFFA4546000-memory.dmp

    Filesize

    4KB

  • memory/1140-7-0x00007FFFA4290000-0x00007FFFA4C31000-memory.dmp

    Filesize

    9.6MB

  • memory/1140-3-0x00007FFFA4290000-0x00007FFFA4C31000-memory.dmp

    Filesize

    9.6MB

  • memory/1140-18-0x00007FFFA4290000-0x00007FFFA4C31000-memory.dmp

    Filesize

    9.6MB

  • memory/2236-22-0x00007FFFA4290000-0x00007FFFA4C31000-memory.dmp

    Filesize

    9.6MB

  • memory/2236-24-0x00007FFFA4290000-0x00007FFFA4C31000-memory.dmp

    Filesize

    9.6MB

  • memory/4704-17-0x00007FFFA4290000-0x00007FFFA4C31000-memory.dmp

    Filesize

    9.6MB

  • memory/4704-19-0x00007FFFA4290000-0x00007FFFA4C31000-memory.dmp

    Filesize

    9.6MB

  • memory/4704-20-0x00007FFFA4290000-0x00007FFFA4C31000-memory.dmp

    Filesize

    9.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.