General

  • Target

    98925f9c0af3f392a8ecdc2ce36b87c0N.exe

  • Size

    951KB

  • Sample

    240719-p35n8avhmc

  • MD5

    98925f9c0af3f392a8ecdc2ce36b87c0

  • SHA1

    22ddfbb4193633048cd0d593d26aad0d44d71783

  • SHA256

    c025ba37aeaf2f55eb091677304f88d2188bf9872a9d56d91820d1160c5de13d

  • SHA512

    ff35e53f4b707635d50c234e54acffe05e0f25a63f76138b193f25f0d9e2ef97aa4dcdbdc0ae788f306a2b6eddf551382d5c8faf6cab9d0fd56681af15dc02c8

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5V:Rh+ZkldDPK8YaKjV

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      98925f9c0af3f392a8ecdc2ce36b87c0N.exe

    • Size

      951KB

    • MD5

      98925f9c0af3f392a8ecdc2ce36b87c0

    • SHA1

      22ddfbb4193633048cd0d593d26aad0d44d71783

    • SHA256

      c025ba37aeaf2f55eb091677304f88d2188bf9872a9d56d91820d1160c5de13d

    • SHA512

      ff35e53f4b707635d50c234e54acffe05e0f25a63f76138b193f25f0d9e2ef97aa4dcdbdc0ae788f306a2b6eddf551382d5c8faf6cab9d0fd56681af15dc02c8

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5V:Rh+ZkldDPK8YaKjV

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks