General

  • Target

    cb7249286458f0f6cb283ed549e3d60b3f635064c261fe9c1eec6e11fe8cdbc4

  • Size

    951KB

  • Sample

    240709-ft2frsxerl

  • MD5

    f4e8e150b40c4c5300637c8e8855aef3

  • SHA1

    d6eaa5c03f39b9996b2e6b0d7aee7dc12aa94457

  • SHA256

    cb7249286458f0f6cb283ed549e3d60b3f635064c261fe9c1eec6e11fe8cdbc4

  • SHA512

    a25ae65a0c13e22d3285746dacc62b9791d9a760421a8e3b162fedb9f3e4e3e2d1ab66f9ebe125bfca200bd2ee3111ec56c0e50c28cf54a6427f95cd017733f8

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5HY:Rh+ZkldDPK8YaKjHY

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      cb7249286458f0f6cb283ed549e3d60b3f635064c261fe9c1eec6e11fe8cdbc4

    • Size

      951KB

    • MD5

      f4e8e150b40c4c5300637c8e8855aef3

    • SHA1

      d6eaa5c03f39b9996b2e6b0d7aee7dc12aa94457

    • SHA256

      cb7249286458f0f6cb283ed549e3d60b3f635064c261fe9c1eec6e11fe8cdbc4

    • SHA512

      a25ae65a0c13e22d3285746dacc62b9791d9a760421a8e3b162fedb9f3e4e3e2d1ab66f9ebe125bfca200bd2ee3111ec56c0e50c28cf54a6427f95cd017733f8

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5HY:Rh+ZkldDPK8YaKjHY

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks