General

  • Target

    edaea4ab89559b09e4d1b1d60e53c2e8846ca78e602b3901f4dd3be20837495e

  • Size

    952KB

  • Sample

    240809-efs2sswepm

  • MD5

    9e3dc924e4ec3b7be1fde795f6bd95d1

  • SHA1

    577073356417dc1a76b85d30ddd159d103592c23

  • SHA256

    edaea4ab89559b09e4d1b1d60e53c2e8846ca78e602b3901f4dd3be20837495e

  • SHA512

    b96da8b273e0c08cb0b25afd914a6c80bc1b57687bda3db952b17210a40f4373f0d3bd88b1ee20ed5d6b1cae7ecac40ca5e95a1968eea29cf992333ada027f68

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5J:Rh+ZkldDPK8YaKjJ

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      edaea4ab89559b09e4d1b1d60e53c2e8846ca78e602b3901f4dd3be20837495e

    • Size

      952KB

    • MD5

      9e3dc924e4ec3b7be1fde795f6bd95d1

    • SHA1

      577073356417dc1a76b85d30ddd159d103592c23

    • SHA256

      edaea4ab89559b09e4d1b1d60e53c2e8846ca78e602b3901f4dd3be20837495e

    • SHA512

      b96da8b273e0c08cb0b25afd914a6c80bc1b57687bda3db952b17210a40f4373f0d3bd88b1ee20ed5d6b1cae7ecac40ca5e95a1968eea29cf992333ada027f68

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5J:Rh+ZkldDPK8YaKjJ

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks