General

  • Target

    6df11529c5d8b0073039b3c432f6baea8d7d66b8a24d0e9893553e7b0e109582

  • Size

    952KB

  • Sample

    240807-26d2wswcjm

  • MD5

    1fffd1d60426c31a6b1d479f33df6389

  • SHA1

    23e09bf65258cdde303fd951b7a65aae4858a4ff

  • SHA256

    6df11529c5d8b0073039b3c432f6baea8d7d66b8a24d0e9893553e7b0e109582

  • SHA512

    03ced5ad79f541f1d8a4b864ab7f63f02481c03dfbe672e722c791c81ecab2af3157372dfebd1be308652f16bcfd1c9620c500900e1fc2226c52becbf5c54ff6

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5M:Rh+ZkldDPK8YaKjM

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      6df11529c5d8b0073039b3c432f6baea8d7d66b8a24d0e9893553e7b0e109582

    • Size

      952KB

    • MD5

      1fffd1d60426c31a6b1d479f33df6389

    • SHA1

      23e09bf65258cdde303fd951b7a65aae4858a4ff

    • SHA256

      6df11529c5d8b0073039b3c432f6baea8d7d66b8a24d0e9893553e7b0e109582

    • SHA512

      03ced5ad79f541f1d8a4b864ab7f63f02481c03dfbe672e722c791c81ecab2af3157372dfebd1be308652f16bcfd1c9620c500900e1fc2226c52becbf5c54ff6

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5M:Rh+ZkldDPK8YaKjM

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks