General

  • Target

    ed916ecb64c1a8b926be87c9af8e2bb0N.exe

  • Size

    952KB

  • Sample

    240815-teqmlsvdkq

  • MD5

    ed916ecb64c1a8b926be87c9af8e2bb0

  • SHA1

    13c5afaf58a0f8c237b34aee16fdbea4103d8cb1

  • SHA256

    5d70ecc14a551bae6428064032e540a2315f9d584f7a990093c1fc5850791e0a

  • SHA512

    477c0557e60024989fee7a2ed23004270a6087cdb20f6682ffd383b4c3e222bbc6e1dc3df59270491bcafb6409699327d44b96a4bfff0f2e985db990c8e8c0a8

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT55:Rh+ZkldDPK8YaKj5

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      ed916ecb64c1a8b926be87c9af8e2bb0N.exe

    • Size

      952KB

    • MD5

      ed916ecb64c1a8b926be87c9af8e2bb0

    • SHA1

      13c5afaf58a0f8c237b34aee16fdbea4103d8cb1

    • SHA256

      5d70ecc14a551bae6428064032e540a2315f9d584f7a990093c1fc5850791e0a

    • SHA512

      477c0557e60024989fee7a2ed23004270a6087cdb20f6682ffd383b4c3e222bbc6e1dc3df59270491bcafb6409699327d44b96a4bfff0f2e985db990c8e8c0a8

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT55:Rh+ZkldDPK8YaKj5

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks