{"id":1545,"date":"2024-09-24T10:20:54","date_gmt":"2024-09-24T10:20:54","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=1545"},"modified":"2025-07-29T07:19:19","modified_gmt":"2025-07-29T07:19:19","slug":"analysis-of-revenge-rat-campaign","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/analysis-of-revenge-rat-campaign\/","title":{"rendered":"Analysis of Revenge RAT Campaign"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1056\" height=\"613\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/178234720-revengerat-lab-featimg.webp\" alt=\"\" class=\"wp-image-1739\"\/><\/figure>\n<\/div>\n\n\n<p>Revenge RAT is a Remote Access Trojan (RAT) that is known to be a relatively straightforward and openly accessible malware. As reported by LMNTRIX CDC, this particular RAT has the capability to collect system information autonomously, enabling malicious actors to gain remote access to targeted systems. Once compromised, the attackers can take control of various components, including webcams, microphones, and other utilities present in the system.<\/p>\n\n\n\n<p><strong>Infection Chain<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"331\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-13.webp\" alt=\"\" class=\"wp-image-1546\"\/><\/figure>\n\n\n\n<p><strong>Target \u2013<\/strong> MS Windows Platform<\/p>\n\n\n\n<p><strong>Language Used \u2013 <\/strong>.NET Language<\/p>\n\n\n\n<p><strong>Infection Vector \u2013<\/strong> Spear phishing e-mails<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Source Code Analysis of Revenge RAT<\/h3>\n\n\n\n<p>Revenge RAT initially showed up in mid-2016, and the RAT was written in .NET language. The code of the Revenge RAT that we extracted is unpacked (not packed\/obfuscated). The many classes and methods found in the decompiled code are described here for better understanding.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"646\" height=\"124\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-13.webp\" alt=\"\" class=\"wp-image-1547\"\/><\/figure>\n\n\n\n<p>One of the main objectives of many threat actor&nbsp;groups is to introduce persistent malware onto a business network, and they are continuously seeking for new ways to accomplish this. However, there are occasions when tried-and-true methods work best.<\/p>\n\n\n\n<p>Researchers from LMNTRIX have been monitoring the activities of one threat group that targets financial services firms and governmental organizations with high-quality spear phishing emails in order to install a &#8220;modified version&#8221; of the well-known Revenge RAT and exfiltrate a range of sensitive data. For a long period of time, many different sorts of threat actor groups have used remote access trojans (RAT) as common tools for gaining initial access.<\/p>\n\n\n\n<p>They frequently come with a wide range of features and provide an attacker one of the things they most desire: ongoing remote access to a target network.<\/p>\n\n\n\n<p><strong>Examples \u2013 From Revenge RAT\u2019s source code analysis by LMNTRIX,<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"457\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-13.webp\" alt=\"\" class=\"wp-image-1548\"\/><\/figure>\n\n\n\n<p>Many Remote Access Trojans have been marketed extensively in a range of underground sites, while others are built for the exclusive use by one individual or group and never made public.<\/p>\n\n\n\n<p>Sometimes a piece of malware&#8217;s source code is also made available to the public, as was the case with the Revenge RAT. Having access to the source code enables attackers to make changes that can both increase the malware&#8217;s potency and help it get past security measures, it gives us all the more reason to &#8220;study&#8221; and analyse Revenge RAT from time to time.<\/p>\n\n\n\n<p><strong>Main Function \u2013 declaration, compiler and imported libraries,<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"855\" height=\"510\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-14.webp\" alt=\"\" class=\"wp-image-1549\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"817\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-14.webp\" alt=\"\" class=\"wp-image-1550\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"931\" height=\"775\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-14.webp\" alt=\"\" class=\"wp-image-1551\"\/><\/figure>\n\n\n\n<p><strong>Code for Date, Time &amp; Geolocation \u2013 Enumeration,<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"414\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-14.webp\" alt=\"\" class=\"wp-image-1552\"\/><\/figure>\n\n\n\n<p><strong>Local System Enumeration by Revenge RAT,<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"564\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-12.webp\" alt=\"\" class=\"wp-image-1553\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"457\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-10.webp\" alt=\"\" class=\"wp-image-1554\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"414\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10-10.webp\" alt=\"\" class=\"wp-image-1555\"\/><\/figure>\n\n\n\n<p><strong>Code for Keylogger functionality,<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"645\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/11-4.webp\" alt=\"\" class=\"wp-image-1556\"\/><\/figure>\n\n\n\n<p><strong>Code for Password list being exported,<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"458\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/12-4.webp\" alt=\"\" class=\"wp-image-1557\"\/><\/figure>\n\n\n\n<p><strong>Code for Wireless AP Enumeration,<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"200\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/13-4.webp\" alt=\"\" class=\"wp-image-1558\"\/><\/figure>\n\n\n\n<p><strong>Code for Revenge RAT Clients (list), and plotting location on Google maps,<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"569\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/14-4.webp\" alt=\"\" class=\"wp-image-1559\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Sample Information<\/strong><\/p>\n\n\n\n<p>Threat Name: Revenge RAT | Classification: Remote Access Trojan \/ Injector<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"354\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/15-3.webp\" alt=\"\" class=\"wp-image-1560\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Technical Analysis of the Revenge RAT sample,<\/h3>\n\n\n\n<p>A PPT file, which stands for PowerPoint Presentation, is a format primarily associated with Microsoft PowerPoint, a popular software used for creating presentations. PPT files consist of slides that can contain a variety of elements such as text, images, charts, tables, multimedia (audio or video), animations, and transitions. They enable users to develop visually engaging and interactive presentations suited for diverse purposes like business meetings, educational lectures, training sessions, and more.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"781\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/16-2.webp\" alt=\"\" class=\"wp-image-1561\" style=\"width:1024px;height:781px\"\/><\/figure>\n\n\n\n<p><strong>MS Powerpoint &#8211; Security Notice Window &#8211; VBA Macro Code<\/strong><\/p>\n\n\n\n<p>These files are typically saved in a binary format and can be accessed and modified using Microsoft PowerPoint or compatible software like Google Slides or Apple Keynote. PPT files have gained widespread acceptance as the standard format for crafting and sharing presentations, owing to their extensive usage and compatibility across multiple platforms and operating systems.<\/p>\n\n\n\n<p><strong>PPT Embedded file Structure<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"937\" height=\"391\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/17-2.webp\" alt=\"\" class=\"wp-image-1562\"\/><\/figure>\n\n\n\n<p>It&#8217;s important to note that embedding files can increase the overall size of the PPT file, so it&#8217;s important to consider the file size and compatibility when sharing or distributing presentations with embedded files.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"996\" height=\"937\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/18-1.webp\" alt=\"\" class=\"wp-image-1563\"\/><\/figure>\n\n\n\n<p><strong>Embedded file &#8211; Randomized folder&gt; asdwede3f Compobj<\/strong><\/p>\n\n\n\n<p>Attribute VB_Name = &#8220;<strong>asdwede3f<\/strong>&#8220;<\/p>\n\n\n\n<p>Attribute VB_Base =<\/p>\n\n\n\n<p>&#8220;0{7B62F3DE-0C0F-4C64-A532-883B3E7891E5}{4D17EC23-B7E9-4A3D-921E-4C14D1AF354E}&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"363\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/19-1.webp\" alt=\"\" class=\"wp-image-1564\"\/><\/figure>\n\n\n\n<p>Here we can see the PowerShell command which invokes the web request and quite it\u2019s a long string. Also, it\u2019s base64 encoded and below we can see the decoded values.<\/p>\n\n\n\n<p>Generally, Base64 encoding is a way to represent binary data in ASCII text format. It is mainly used to encode data for transmission over networks or to store data in a text format.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"214\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/20-1.webp\" alt=\"\" class=\"wp-image-1565\"\/><\/figure>\n\n\n\n<p><strong>Similar Executable Parent files<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"351\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/21.webp\" alt=\"\" class=\"wp-image-1566\"\/><\/figure>\n\n\n\n<p><strong>Indicators of Compromise [IOC] for Revenge RAT,<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"554\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/22.webp\" alt=\"\" class=\"wp-image-1567\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Appendix A \u2013 Functions available within the Revenge RAT (source),<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"612\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/23.webp\" alt=\"\" class=\"wp-image-1568\" style=\"width:768px;height:459px\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"636\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/24.webp\" alt=\"\" class=\"wp-image-1569\" style=\"width:768px;height:477px\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Appendix B &#8211; MITRE ATT&amp;CK Tactics &amp; Techniques for Revenge RAT,<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>ID<\/td><td>Tactic<\/td><td>Technique<\/td><\/tr><tr><td>TA0001<\/td><td>Initial Access<\/td><td>Spearphishing Attachment<\/td><\/tr><tr><td>TA0002<\/td><td>Execution<\/td><td>Windows Scripting &#8211; .PPT (or) .PPAM Exploitation for client Execution<\/td><\/tr><tr><td>TA0003<\/td><td>Persistence<\/td><td>Registry Run Keys \/ Startup Folder<\/td><\/tr><tr><td>TA0004<\/td><td>Privilege Escalation<\/td><td>Scheduled Task Process Injection<\/td><\/tr><tr><td>TA0005<\/td><td>Defense Evasion<\/td><td>Modify Registry Virtualization and Sandbox Evasion Technique Obfuscated file or Information<\/td><\/tr><tr><td>TA0006<\/td><td>Credential Access<\/td><td>OS Credential Dumping LSASS Memory<\/td><\/tr><tr><td>TA0007<\/td><td>Discovery<\/td><td>System Software Discovery Process Discovery File and Directory Discovery Query Registry<\/td><\/tr><tr><td>TA0008<\/td><td>Lateral Movement<\/td><td>Remote file copy<\/td><\/tr><tr><td>TA0009<\/td><td>Collection<\/td><td>Archive Collected Data Clipboard Data Data from Local System<\/td><\/tr><tr><td>TA0011<\/td><td>C&amp;C Server<\/td><td>Encrypted Channels Web Protocols &#8211; Standard Application Layer Protocol Data Obfuscation<\/td><\/tr><tr><td>TA0012<\/td><td>Network Effect<\/td><td>Eavesdrop on insecure communication network channel Exploit SS7 for Redirection &amp; Tracking Device Location<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Revenge RAT is a Remote Access Trojan (RAT) that is known to be a relatively straightforward and openly accessible malware. As reported by LMNTRIX CDC, this particular RAT has the capability to collect system information autonomously, enabling malicious actors to gain remote access to targeted systems. Once compromised, the attackers can take control of various [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1739,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-1545","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=1545"}],"version-history":[{"count":4,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1545\/revisions"}],"predecessor-version":[{"id":4404,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1545\/revisions\/4404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1739"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=1545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=1545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=1545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}