MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a78ceb0178abe8b1dbf87cd6c17fa2a2a10c34f4837b5f87b0e206f2a3d534a4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RevengeRAT


Vendor detections: 14


Maldoc score: 9


Intelligence 14 IOCs 1 YARA 2 File information Comments

SHA256 hash: a78ceb0178abe8b1dbf87cd6c17fa2a2a10c34f4837b5f87b0e206f2a3d534a4
SHA3-384 hash: fee13406ae69be41fde4f5499383ab324a39e9c24b5c9a06d4606c60f89107203c5e86bbb2e2ac2898d50758d941dbd5
SHA1 hash: 8c06981427c9881ace953d9db8cd259a57bd0c92
MD5 hash: e664b47a06d3b24fb72f8e644d0dce61
humanhash: football-earth-fourteen-equal
File name:QuickBooks Invoice Enclosed 1000119834723.xls
Download: download sample
Signature RevengeRAT
File size:37'888 bytes
First seen:2022-04-07 18:31:32 UTC
Last seen:Never
File type:Excel file xls
MIME type:application/vnd.ms-excel
ssdeep 768:K6cexEtjPOtioVjDGUU1qfDlaGGx+cL2Q98x/Z/QbMA+lAacSmsz:fpxEtjPOtioVjDGUU1qfDlaGGx+cL2Qk
TLSH T130033FA27296D856D9590B354DE7D6E63726FC12AF63820B3284F72F2F71AC08D03617
Reporter abuse_ch
Tags:RevengeRAT xls


Avatar
abuse_ch
RevengeRAT C2:
38.132.101.45:1122

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
38.132.101.45:1122 https://threatfox.abuse.ch/ioc/517359/

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 9
OLE dump

MalwareBazaar was able to identify 18 sections in this file using oledump:

Section IDSection sizeSection name
1107 bytesCompObj
2280 bytesDocumentSummaryInformation
3220 bytesSummaryInformation
414922 bytesWorkbook
5522 bytes_VBA_PROJECT_CUR/PROJECT
6107 bytes_VBA_PROJECT_CUR/PROJECTwm
71194 bytes_VBA_PROJECT_CUR/VBA/Module2
8999 bytes_VBA_PROJECT_CUR/VBA/Sheet1
9999 bytes_VBA_PROJECT_CUR/VBA/Sheet2
102982 bytes_VBA_PROJECT_CUR/VBA/ThisWorkbook
113175 bytes_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
122785 bytes_VBA_PROJECT_CUR/VBA/__SRP_0
13222 bytes_VBA_PROJECT_CUR/VBA/__SRP_1
14249 bytes_VBA_PROJECT_CUR/VBA/__SRP_2
15160 bytes_VBA_PROJECT_CUR/VBA/__SRP_3
161446 bytes_VBA_PROJECT_CUR/VBA/__SRP_4
17156 bytes_VBA_PROJECT_CUR/VBA/__SRP_5
18584 bytes_VBA_PROJECT_CUR/VBA/dir
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecWorkbook_OpenRuns when the Excel Workbook is opened
IOC54.101.231.83IPv4 address
SuspiciousCreateMay execute file or a system command through WMI
SuspiciousGetObjectMay get an OLE object with a running instance
SuspiciousStrReverseMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
1
# of downloads :
728
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
QuickBooks Invoice Enclosed 1000119834723.xls
Verdict:
Malicious activity
Analysis date:
2022-04-07 18:32:38 UTC
Tags:
macros macros-on-open opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
File type:
application/vnd.ms-excel
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Launching a process
Sending an HTTP GET request
Creating a process with a hidden window
Bypassing of proactive protection methods using Windows Management Instrumentation (WMI)
Launching a process by exploiting the app vulnerability
Result
Verdict:
Malicious
File Type:
Legacy Excel File with Macro
Payload URLs
URL
File name
54.101.231.83
ThisWorkbook
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm evasive macros macros-on-open mshta mshta.exe
Label:
Malicious
Suspicious Score:
5.4/10
Score Malicious:
54%
Score Benign:
46%
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Document With Minimal Content
Document contains less than 1 kilobyte of semantic information.
Result
Threat name:
RevengeRAT
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Bypasses PowerShell execution policy
Creates processes via WMI
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Obfuscated command line found
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Windows Shell File Write to Suspicious Folder
Sigma detected: WScript or CScript Dropper
Writes to foreign memory regions
Yara detected RevengeRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 605157 Sample: QuickBooks Invoice Enclosed... Startdate: 07/04/2022 Architecture: WINDOWS Score: 96 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Yara detected RevengeRAT 2->56 58 5 other signatures 2->58 8 powershell.exe 14 25 2->8         started        12 powershell.exe 8 2->12         started        14 powershell.exe 2->14         started        16 3 other processes 2->16 process3 dnsIp4 42 C:\ProgramData\...SAGHUSPUHWAQIBRNDDOTF.vbs, ASCII 8->42 dropped 44 C:\ProgramData\...SAGHUSPUHWAQIBRNDDOTF.ps1, ASCII 8->44 dropped 46 C:\ProgramData\...SAGHUSPUHWAQIBRNDDOTF.bat, ASCII 8->46 dropped 60 Bypasses PowerShell execution policy 8->60 19 powershell.exe 36 8->19         started        21 conhost.exe 8->21         started        23 cmd.exe 12->23         started        25 conhost.exe 12->25         started        27 cmd.exe 14->27         started        29 conhost.exe 14->29         started        48 38.132.101.45, 1122, 49725, 49726 M247GB United States 16->48 50 192.168.2.1 unknown unknown 16->50 62 Creates processes via WMI 16->62 file5 signatures6 process7 process8 31 wscript.exe 19->31         started        34 powershell.exe 23->34         started        36 powershell.exe 27->36         started        signatures9 64 Creates processes via WMI 31->64 66 Writes to foreign memory regions 34->66 68 Injects a PE file into a foreign processes 34->68 38 jsc.exe 34->38         started        40 jsc.exe 36->40         started        process10
Threat name:
Script.Trojan.Valyria
Status:
Malicious
First seen:
2022-04-07 18:32:09 UTC
File Type:
Document
Extracted files:
24
AV detection:
15 of 26 (57.69%)
Threat level:
  5/5
Result
Malware family:
revengerat
Score:
  10/10
Tags:
family:revengerat macro macro_on_action trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Drops file in System32 directory
Suspicious use of SetThreadContext
Blocklisted process makes network request
Process spawned unexpected child process
RevengeRAT
Malware Config
Dropper Extraction:
http://38.132.101.45/22/Enc.txt
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments