General

  • Target

    d50ef43b4ed74058e2d36e935b1bc02fe80be1c25bb15210a952fbdba2c585ba

  • Size

    951KB

  • Sample

    240621-ekrpja1hmn

  • MD5

    97a531f9e316f36f87f8107f324749f3

  • SHA1

    fd4417800a76e97ba01c6296108cdd4b3acf21a2

  • SHA256

    d50ef43b4ed74058e2d36e935b1bc02fe80be1c25bb15210a952fbdba2c585ba

  • SHA512

    68a49529dc6fe2c5ede9a855da7975387149ef8b854d0e7049107b47e48e410a8b0f7b9043a62cd0441d9842fb879e5bad7936ed6e060ab2070d58bac5cbc235

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5H5:Rh+ZkldDPK8YaKjH5

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      d50ef43b4ed74058e2d36e935b1bc02fe80be1c25bb15210a952fbdba2c585ba

    • Size

      951KB

    • MD5

      97a531f9e316f36f87f8107f324749f3

    • SHA1

      fd4417800a76e97ba01c6296108cdd4b3acf21a2

    • SHA256

      d50ef43b4ed74058e2d36e935b1bc02fe80be1c25bb15210a952fbdba2c585ba

    • SHA512

      68a49529dc6fe2c5ede9a855da7975387149ef8b854d0e7049107b47e48e410a8b0f7b9043a62cd0441d9842fb879e5bad7936ed6e060ab2070d58bac5cbc235

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5H5:Rh+ZkldDPK8YaKjH5

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks