General

  • Target

    ad95283da500e39394a36436e4b083898d6364562530ab8f1875a95bac9fdbe1

  • Size

    952KB

  • Sample

    240728-ddqyzsxejf

  • MD5

    b58ee82ded07a42848d0da71a4397660

  • SHA1

    207b4c33853c7eb2a26b357c00c23dca750c9e7f

  • SHA256

    ad95283da500e39394a36436e4b083898d6364562530ab8f1875a95bac9fdbe1

  • SHA512

    888ceb03179e1ad31e25c2c7339db68c0cf59e8e120a6f2b2e92afb141c35ca7af37e0348757b9afdaf4ce6bd8d8e02bd6892a4c4a34fb841b5ff0dcc2074152

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT53:Rh+ZkldDPK8YaKj3

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      ad95283da500e39394a36436e4b083898d6364562530ab8f1875a95bac9fdbe1

    • Size

      952KB

    • MD5

      b58ee82ded07a42848d0da71a4397660

    • SHA1

      207b4c33853c7eb2a26b357c00c23dca750c9e7f

    • SHA256

      ad95283da500e39394a36436e4b083898d6364562530ab8f1875a95bac9fdbe1

    • SHA512

      888ceb03179e1ad31e25c2c7339db68c0cf59e8e120a6f2b2e92afb141c35ca7af37e0348757b9afdaf4ce6bd8d8e02bd6892a4c4a34fb841b5ff0dcc2074152

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT53:Rh+ZkldDPK8YaKj3

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks