General

  • Target

    f556cf6154699dab09845accb34c5eea5cdb8643b4a7006a5cefb68ae6da60a7

  • Size

    951KB

  • Sample

    240811-ew69csvdjn

  • MD5

    8c35d2b8cf8bb83792d3204668675bee

  • SHA1

    7acbf69091f844cf9505bb7de3d60daad647dcd0

  • SHA256

    f556cf6154699dab09845accb34c5eea5cdb8643b4a7006a5cefb68ae6da60a7

  • SHA512

    bf7d4d0659c96c34b591de4c77208909eb3f3aad277ffb6f861d3953a3c75c3f7ab74dbe08c2ef5f920272e261f3242438a63c7fe1ae7ce3b45161e7b301c0cc

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5K:Rh+ZkldDPK8YaKjK

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      f556cf6154699dab09845accb34c5eea5cdb8643b4a7006a5cefb68ae6da60a7

    • Size

      951KB

    • MD5

      8c35d2b8cf8bb83792d3204668675bee

    • SHA1

      7acbf69091f844cf9505bb7de3d60daad647dcd0

    • SHA256

      f556cf6154699dab09845accb34c5eea5cdb8643b4a7006a5cefb68ae6da60a7

    • SHA512

      bf7d4d0659c96c34b591de4c77208909eb3f3aad277ffb6f861d3953a3c75c3f7ab74dbe08c2ef5f920272e261f3242438a63c7fe1ae7ce3b45161e7b301c0cc

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5K:Rh+ZkldDPK8YaKjK

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks