General

  • Target

    87ac7a79da700603bc1a9f3f16ed5260N.exe

  • Size

    952KB

  • Sample

    240807-jfl1psvcqp

  • MD5

    87ac7a79da700603bc1a9f3f16ed5260

  • SHA1

    d32bc9d8b7e0f63bd2d1c21bf2300d8317b552e5

  • SHA256

    4af5e76114368da53d12261ccdd89471cb16347871e2d2671cbce7b77b4071dc

  • SHA512

    3f08bb5adcd027b672f3348f0476a0ca395e3d9f1dc42591100f7e22754860a111a6a6a784e56771a9bd209a4d22d634588e3ed725c3f0f345e3a1a3d69ca5fe

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5H:Rh+ZkldDPK8YaKjH

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      87ac7a79da700603bc1a9f3f16ed5260N.exe

    • Size

      952KB

    • MD5

      87ac7a79da700603bc1a9f3f16ed5260

    • SHA1

      d32bc9d8b7e0f63bd2d1c21bf2300d8317b552e5

    • SHA256

      4af5e76114368da53d12261ccdd89471cb16347871e2d2671cbce7b77b4071dc

    • SHA512

      3f08bb5adcd027b672f3348f0476a0ca395e3d9f1dc42591100f7e22754860a111a6a6a784e56771a9bd209a4d22d634588e3ed725c3f0f345e3a1a3d69ca5fe

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5H:Rh+ZkldDPK8YaKjH

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks