General

  • Target

    5e85e428d5fd914871f907c891133a8fdb8918a4006417f2b56fd588eb6f381d

  • Size

    952KB

  • Sample

    240816-3gnepstgjb

  • MD5

    7019f3d1b39a653d2977136ad9fec885

  • SHA1

    f63afd45c1ab4bf7ae9d294a13a53284fdab1eba

  • SHA256

    5e85e428d5fd914871f907c891133a8fdb8918a4006417f2b56fd588eb6f381d

  • SHA512

    9ef84906858b719ddaaf674edb0d3f59052ac379178ffdc5d43f7566bfcdf2bcad004a8ab2e25bca0d361352421f70d38e2f000429ca8a36f0b17e9b1f945695

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5A:Rh+ZkldDPK8YaKjA

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      5e85e428d5fd914871f907c891133a8fdb8918a4006417f2b56fd588eb6f381d

    • Size

      952KB

    • MD5

      7019f3d1b39a653d2977136ad9fec885

    • SHA1

      f63afd45c1ab4bf7ae9d294a13a53284fdab1eba

    • SHA256

      5e85e428d5fd914871f907c891133a8fdb8918a4006417f2b56fd588eb6f381d

    • SHA512

      9ef84906858b719ddaaf674edb0d3f59052ac379178ffdc5d43f7566bfcdf2bcad004a8ab2e25bca0d361352421f70d38e2f000429ca8a36f0b17e9b1f945695

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5A:Rh+ZkldDPK8YaKjA

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks