General

  • Target

    9cb090e312e6e8a2f4376bd68a869c905edc738cd46a1c88de2fce08c0d28c1d

  • Size

    951KB

  • Sample

    240711-darq4sxcpg

  • MD5

    e81bf5fa84ae22eb770e4a26090ad65b

  • SHA1

    91b60fd0cf9b5d9a197cdaa821436b9f6b54c827

  • SHA256

    9cb090e312e6e8a2f4376bd68a869c905edc738cd46a1c88de2fce08c0d28c1d

  • SHA512

    3c430ce20f82dd82a5765a50d50570d2c4853284ab1ec683a9a00a740cc7637a5cb2c10c0e933afc437d35b48a82b754db533a4feabd2eb58d3f223352dc69eb

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5B:Rh+ZkldDPK8YaKjB

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      9cb090e312e6e8a2f4376bd68a869c905edc738cd46a1c88de2fce08c0d28c1d

    • Size

      951KB

    • MD5

      e81bf5fa84ae22eb770e4a26090ad65b

    • SHA1

      91b60fd0cf9b5d9a197cdaa821436b9f6b54c827

    • SHA256

      9cb090e312e6e8a2f4376bd68a869c905edc738cd46a1c88de2fce08c0d28c1d

    • SHA512

      3c430ce20f82dd82a5765a50d50570d2c4853284ab1ec683a9a00a740cc7637a5cb2c10c0e933afc437d35b48a82b754db533a4feabd2eb58d3f223352dc69eb

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5B:Rh+ZkldDPK8YaKjB

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks