General

  • Target

    004e50b0292f2d54336702e2371d9a50.exe

  • Size

    951KB

  • Sample

    240705-qbx1qsyenp

  • MD5

    004e50b0292f2d54336702e2371d9a50

  • SHA1

    94c35280809422a5b14b70fc7dcda9aa9af5541b

  • SHA256

    c69a94835ee63aedd0a12cd38ec90740cb4c3907983c19d6a382cf7d37c39c7a

  • SHA512

    0ce418bbbe2f20535cd04a6e238e99cb02fc8f5e4bf7be3d832a5db4eae9798f187c5f1e9df0e0f34d3f48edba6591c485484d12dbd7e7fa213a0a7fd961650e

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT55:Rh+ZkldDPK8YaKj5

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      004e50b0292f2d54336702e2371d9a50.exe

    • Size

      951KB

    • MD5

      004e50b0292f2d54336702e2371d9a50

    • SHA1

      94c35280809422a5b14b70fc7dcda9aa9af5541b

    • SHA256

      c69a94835ee63aedd0a12cd38ec90740cb4c3907983c19d6a382cf7d37c39c7a

    • SHA512

      0ce418bbbe2f20535cd04a6e238e99cb02fc8f5e4bf7be3d832a5db4eae9798f187c5f1e9df0e0f34d3f48edba6591c485484d12dbd7e7fa213a0a7fd961650e

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT55:Rh+ZkldDPK8YaKj5

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks