General

  • Target

    9456b61b3c967b08afeb2ef91fd17000N.exe

  • Size

    951KB

  • Sample

    240721-j842zswhkb

  • MD5

    9456b61b3c967b08afeb2ef91fd17000

  • SHA1

    95bfaec5aee77defa94adbc016417dfc9916c9fa

  • SHA256

    07b696312d1383ecd59be74ca328722df021c671501cec72d1cbfaf0ad2a2832

  • SHA512

    0ed5682cec0a535c91ab52325c068b954f9d0003a8cdcb0ecb175a6b8b93d177cccd1513f3c0f5036a62cd7031ff3a3f2fd533dd9cca8f0caadab0e2c0975090

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5f:Rh+ZkldDPK8YaKjf

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      9456b61b3c967b08afeb2ef91fd17000N.exe

    • Size

      951KB

    • MD5

      9456b61b3c967b08afeb2ef91fd17000

    • SHA1

      95bfaec5aee77defa94adbc016417dfc9916c9fa

    • SHA256

      07b696312d1383ecd59be74ca328722df021c671501cec72d1cbfaf0ad2a2832

    • SHA512

      0ed5682cec0a535c91ab52325c068b954f9d0003a8cdcb0ecb175a6b8b93d177cccd1513f3c0f5036a62cd7031ff3a3f2fd533dd9cca8f0caadab0e2c0975090

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5f:Rh+ZkldDPK8YaKjf

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks