General

  • Target

    01726ecdbddf2caa6bc15c71993749c927c0ac91cf100909a769e22502cce4f7

  • Size

    950KB

  • Sample

    240331-xd894shf29

  • MD5

    434cab90ca16a78dd7f78b6884bf4e0a

  • SHA1

    a624721d1b86f27123f924a84ce3138173dbe01d

  • SHA256

    01726ecdbddf2caa6bc15c71993749c927c0ac91cf100909a769e22502cce4f7

  • SHA512

    4c4a686a951c18ad7848f8fb7d1dab4ca8c6188ac44076b723cd022d69f70ed58c1ea48534479b5b10f8b0a8b2cfdb701f4bf43f9848f82bf35e3683da911319

  • SSDEEP

    24576:2AHnh+eWsN3gkA4RV1Hom2KPMmHaKZT5v:Rh+RkldoPK0YaKjv

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      01726ecdbddf2caa6bc15c71993749c927c0ac91cf100909a769e22502cce4f7

    • Size

      950KB

    • MD5

      434cab90ca16a78dd7f78b6884bf4e0a

    • SHA1

      a624721d1b86f27123f924a84ce3138173dbe01d

    • SHA256

      01726ecdbddf2caa6bc15c71993749c927c0ac91cf100909a769e22502cce4f7

    • SHA512

      4c4a686a951c18ad7848f8fb7d1dab4ca8c6188ac44076b723cd022d69f70ed58c1ea48534479b5b10f8b0a8b2cfdb701f4bf43f9848f82bf35e3683da911319

    • SSDEEP

      24576:2AHnh+eWsN3gkA4RV1Hom2KPMmHaKZT5v:Rh+RkldoPK0YaKjv

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks