General

  • Target

    57fb0947d01f5cff6e632dde9f1c0980a408b42915b17a3638858aa5279a9697

  • Size

    952KB

  • Sample

    240812-zpq9sazapj

  • MD5

    f2c081e7d573a967cec46d22e924c19e

  • SHA1

    4db6d97339b466ce6537d5186c8c38e17682256e

  • SHA256

    57fb0947d01f5cff6e632dde9f1c0980a408b42915b17a3638858aa5279a9697

  • SHA512

    b17e210b013392de61607aed65dcf2b169bc8ef98e1b15a69549cba325d33ef125c8fbc627de30f56f27c1b6dcef8308e34c853471657e83c18a587eb1edc1a6

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5w:Rh+ZkldDPK8YaKjw

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      57fb0947d01f5cff6e632dde9f1c0980a408b42915b17a3638858aa5279a9697

    • Size

      952KB

    • MD5

      f2c081e7d573a967cec46d22e924c19e

    • SHA1

      4db6d97339b466ce6537d5186c8c38e17682256e

    • SHA256

      57fb0947d01f5cff6e632dde9f1c0980a408b42915b17a3638858aa5279a9697

    • SHA512

      b17e210b013392de61607aed65dcf2b169bc8ef98e1b15a69549cba325d33ef125c8fbc627de30f56f27c1b6dcef8308e34c853471657e83c18a587eb1edc1a6

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5w:Rh+ZkldDPK8YaKjw

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks