General

  • Target

    Client.bat

  • Size

    286KB

  • Sample

    240611-fxvsdswapc

  • MD5

    63c935a02276c2876f0f40f6ca93de5b

  • SHA1

    06f5951a19367f0d348c0ba4055b42aa2ffcc724

  • SHA256

    8ef692bc1808ce731aebee08f730c9d0a5b6d4695dafab2d420201247f717fc8

  • SHA512

    be0cc7ac331c5613cb567749e0d1b76730620fbb6440a9a2a4a4bfdc719fdd49e466b2685fe0133e77e794f1c49bf7cdcca391e564b3ca8979c5ed6529adae79

  • SSDEEP

    6144:P2xqkImYc6Cyaf3OXrio+jPv1Ra4LfIb55oXNs7attGR9:+qgVylXrio+Tt4rN5ci7a2R9

Malware Config

Targets

    • Target

      Client.bat

    • Size

      286KB

    • MD5

      63c935a02276c2876f0f40f6ca93de5b

    • SHA1

      06f5951a19367f0d348c0ba4055b42aa2ffcc724

    • SHA256

      8ef692bc1808ce731aebee08f730c9d0a5b6d4695dafab2d420201247f717fc8

    • SHA512

      be0cc7ac331c5613cb567749e0d1b76730620fbb6440a9a2a4a4bfdc719fdd49e466b2685fe0133e77e794f1c49bf7cdcca391e564b3ca8979c5ed6529adae79

    • SSDEEP

      6144:P2xqkImYc6Cyaf3OXrio+jPv1Ra4LfIb55oXNs7attGR9:+qgVylXrio+Tt4rN5ci7a2R9

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks