General

  • Target

    c8f99ff198bd9726328a25fb227ddc2dadb52c78f670868d320dfb36e6eaee9f

  • Size

    951KB

  • Sample

    240707-dzykyssfkj

  • MD5

    0db0ae5b4157f808cbaeff1193532297

  • SHA1

    7dfc2df547c419f2b9cc42e8d66e89866053bfe3

  • SHA256

    c8f99ff198bd9726328a25fb227ddc2dadb52c78f670868d320dfb36e6eaee9f

  • SHA512

    ff81725acc53cc764321eba3cfe52154f6eb6a58191e5d9bfe69772293d4fac2d7dbc5e7a8114fca505d2c54dc6f4bbdad1f7aef0c8afa34e093dd35a41269d4

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5q:Rh+ZkldDPK8YaKjq

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      c8f99ff198bd9726328a25fb227ddc2dadb52c78f670868d320dfb36e6eaee9f

    • Size

      951KB

    • MD5

      0db0ae5b4157f808cbaeff1193532297

    • SHA1

      7dfc2df547c419f2b9cc42e8d66e89866053bfe3

    • SHA256

      c8f99ff198bd9726328a25fb227ddc2dadb52c78f670868d320dfb36e6eaee9f

    • SHA512

      ff81725acc53cc764321eba3cfe52154f6eb6a58191e5d9bfe69772293d4fac2d7dbc5e7a8114fca505d2c54dc6f4bbdad1f7aef0c8afa34e093dd35a41269d4

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5q:Rh+ZkldDPK8YaKjq

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks