General

  • Target

    ce41a9f64a7a779c3e9857fab04eb46d6b157b57ab5a28952589b362150cdd49

  • Size

    332KB

  • Sample

    240524-mkr93adh27

  • MD5

    6d6f56be47f1fd8551249a13ddf6bcb2

  • SHA1

    7502ace445cb00f99aaaf2c1ace6cef4d45158fe

  • SHA256

    ce41a9f64a7a779c3e9857fab04eb46d6b157b57ab5a28952589b362150cdd49

  • SHA512

    ddd5198be281d042ec349d1c26a9399a3cdf803fcb65ae880cc8f23cfffa53ada34f9464e438dfb03087ab40902a1a6d676a1099028e3e0475dddfdb3ad20da6

  • SSDEEP

    1536:kG7MA34KtGjNnRm9aTpYlIgayfLyhmyORtjIPxplXCZInfLwbkSOW+69Vu2Ip3vU:z

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://j.top4top.io/p_1626a1zeo1.png

Extracted

Family

revengerat

Botnet

MR_ahmed

C2

windowusers.ddns.net:1188

Mutex

74c924b78701433294

Targets

    • Target

      ce41a9f64a7a779c3e9857fab04eb46d6b157b57ab5a28952589b362150cdd49

    • Size

      332KB

    • MD5

      6d6f56be47f1fd8551249a13ddf6bcb2

    • SHA1

      7502ace445cb00f99aaaf2c1ace6cef4d45158fe

    • SHA256

      ce41a9f64a7a779c3e9857fab04eb46d6b157b57ab5a28952589b362150cdd49

    • SHA512

      ddd5198be281d042ec349d1c26a9399a3cdf803fcb65ae880cc8f23cfffa53ada34f9464e438dfb03087ab40902a1a6d676a1099028e3e0475dddfdb3ad20da6

    • SSDEEP

      1536:kG7MA34KtGjNnRm9aTpYlIgayfLyhmyORtjIPxplXCZInfLwbkSOW+69Vu2Ip3vU:z

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks