General

  • Target

    76ca468ec735f7a9ba3b7a09e270dc3af5a255811104191ff50fcb71c5d4e586

  • Size

    951KB

  • Sample

    240527-3tbxfaff82

  • MD5

    bc79eff5b486b2d85b3ffaf8e854e1d1

  • SHA1

    d9aeec498cbfe547ebe8711d27e1ef056fa0f2f7

  • SHA256

    76ca468ec735f7a9ba3b7a09e270dc3af5a255811104191ff50fcb71c5d4e586

  • SHA512

    83a63668472be2b0e77f92ae0cceab32b8b7979a3d25588655a3f9b738647697d28765a26fc3433cfb17b96d9f9d921d4855c76e7a4b390c3839ec8fa46bd87e

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5L:Rh+ZkldDPK8YaKjL

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      76ca468ec735f7a9ba3b7a09e270dc3af5a255811104191ff50fcb71c5d4e586

    • Size

      951KB

    • MD5

      bc79eff5b486b2d85b3ffaf8e854e1d1

    • SHA1

      d9aeec498cbfe547ebe8711d27e1ef056fa0f2f7

    • SHA256

      76ca468ec735f7a9ba3b7a09e270dc3af5a255811104191ff50fcb71c5d4e586

    • SHA512

      83a63668472be2b0e77f92ae0cceab32b8b7979a3d25588655a3f9b738647697d28765a26fc3433cfb17b96d9f9d921d4855c76e7a4b390c3839ec8fa46bd87e

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5L:Rh+ZkldDPK8YaKjL

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks