General

  • Target

    bb28d0fc75c252d0bd869b5e865d2f30N.exe

  • Size

    951KB

  • Sample

    240721-nvz84a1glr

  • MD5

    bb28d0fc75c252d0bd869b5e865d2f30

  • SHA1

    dde7696d13730daa6555748e414ebf5d461b519f

  • SHA256

    228ec81f7e3a092dce8f0b33e87871ce6426137c25617a231b8d2cc1eaa26d37

  • SHA512

    ebd4c4fe179b3fd07c26041fe4cded117a160801bc55a4f7656182605483a7f5e3bb7b5cd854def593ae245cc5a64f352bf841358859a60fec8119f7e3a45c22

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5M:Rh+ZkldDPK8YaKjM

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      bb28d0fc75c252d0bd869b5e865d2f30N.exe

    • Size

      951KB

    • MD5

      bb28d0fc75c252d0bd869b5e865d2f30

    • SHA1

      dde7696d13730daa6555748e414ebf5d461b519f

    • SHA256

      228ec81f7e3a092dce8f0b33e87871ce6426137c25617a231b8d2cc1eaa26d37

    • SHA512

      ebd4c4fe179b3fd07c26041fe4cded117a160801bc55a4f7656182605483a7f5e3bb7b5cd854def593ae245cc5a64f352bf841358859a60fec8119f7e3a45c22

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5M:Rh+ZkldDPK8YaKjM

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks