General

  • Target

    2f89e92f4274ce1b345205a42fd96bcfd8b2689a3432a633a5d2f3cfe36d2f94

  • Size

    952KB

  • Sample

    240810-ywh2bawbqk

  • MD5

    8a0a4159c5ec08cde43470a67e074859

  • SHA1

    d039f3a302f1c254cbbbca1dffe77937488c3fe0

  • SHA256

    2f89e92f4274ce1b345205a42fd96bcfd8b2689a3432a633a5d2f3cfe36d2f94

  • SHA512

    70f1b382d547afd0939dda51e27ec5267cf7b5b1a27e48de52f0b7ebb751eae78ea9aa27336f66c62ab580b54e9b3b6b8dd2a77d335b8ed646a3582ccbee63da

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5U:Rh+ZkldDPK8YaKjU

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      2f89e92f4274ce1b345205a42fd96bcfd8b2689a3432a633a5d2f3cfe36d2f94

    • Size

      952KB

    • MD5

      8a0a4159c5ec08cde43470a67e074859

    • SHA1

      d039f3a302f1c254cbbbca1dffe77937488c3fe0

    • SHA256

      2f89e92f4274ce1b345205a42fd96bcfd8b2689a3432a633a5d2f3cfe36d2f94

    • SHA512

      70f1b382d547afd0939dda51e27ec5267cf7b5b1a27e48de52f0b7ebb751eae78ea9aa27336f66c62ab580b54e9b3b6b8dd2a77d335b8ed646a3582ccbee63da

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5U:Rh+ZkldDPK8YaKjU

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks