General

  • Target

    0e51e93c5bc304b6f86785b237506b50N.exe

  • Size

    952KB

  • Sample

    240731-2dv5ps1gma

  • MD5

    0e51e93c5bc304b6f86785b237506b50

  • SHA1

    59088604a55be54eeea3cf0b1dd315d46320aca1

  • SHA256

    e7943493154ce4e9bdb0e30f7c077f8fb92304cce53df10caaee9d00485945ce

  • SHA512

    d87e2eb9039c94282ec86517316a42f55917ddc6471fc5e8db141aa4b289503118d761a29fd14bb0e262a33a5f47589a3dbf3345ac5bac7b20faf53831f1ecac

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5f:Rh+ZkldDPK8YaKjf

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      0e51e93c5bc304b6f86785b237506b50N.exe

    • Size

      952KB

    • MD5

      0e51e93c5bc304b6f86785b237506b50

    • SHA1

      59088604a55be54eeea3cf0b1dd315d46320aca1

    • SHA256

      e7943493154ce4e9bdb0e30f7c077f8fb92304cce53df10caaee9d00485945ce

    • SHA512

      d87e2eb9039c94282ec86517316a42f55917ddc6471fc5e8db141aa4b289503118d761a29fd14bb0e262a33a5f47589a3dbf3345ac5bac7b20faf53831f1ecac

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5f:Rh+ZkldDPK8YaKjf

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks