General

  • Target

    10a3dc496b2b7ad7026a6bf76dd22800N.exe

  • Size

    951KB

  • Sample

    240724-z8eebs1bjg

  • MD5

    10a3dc496b2b7ad7026a6bf76dd22800

  • SHA1

    9a19e8b8e2507befd43faee859c6329716ccc977

  • SHA256

    5ac0a50098dbd3dd07f15d4b9eeb43d06c88d4960b0d627d56e3196b2c31de4f

  • SHA512

    71755263ca56bad089a61248d4821aae64b0982d029365dfdb641f3d3c9e103a7f68a52c6ddbe7c8610452d608edf67bfea6c553d43bbc52e861e1b69f2308c1

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5P:Rh+ZkldDPK8YaKjP

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      10a3dc496b2b7ad7026a6bf76dd22800N.exe

    • Size

      951KB

    • MD5

      10a3dc496b2b7ad7026a6bf76dd22800

    • SHA1

      9a19e8b8e2507befd43faee859c6329716ccc977

    • SHA256

      5ac0a50098dbd3dd07f15d4b9eeb43d06c88d4960b0d627d56e3196b2c31de4f

    • SHA512

      71755263ca56bad089a61248d4821aae64b0982d029365dfdb641f3d3c9e103a7f68a52c6ddbe7c8610452d608edf67bfea6c553d43bbc52e861e1b69f2308c1

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5P:Rh+ZkldDPK8YaKjP

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks