General

  • Target

    b31800b5ed8221033b5239d78b3e0200N.exe

  • Size

    952KB

  • Sample

    240816-wbahbs1enr

  • MD5

    b31800b5ed8221033b5239d78b3e0200

  • SHA1

    104e64f4209120038eda0b7d98c902a3e1124201

  • SHA256

    43d4da1dd00d39bee6977222b604d1b79141ad6aaeef02b962cb858d5c62ba6b

  • SHA512

    811e367e997222645e7832bc29d86ad801d7a5ad385acef5bd811a01975fe5b0f6e91d7fba382665d7eeaebe5816af95bdf35a2b3bb0c1ccc741ebb20b11c081

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5F:Rh+ZkldDPK8YaKjF

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      b31800b5ed8221033b5239d78b3e0200N.exe

    • Size

      952KB

    • MD5

      b31800b5ed8221033b5239d78b3e0200

    • SHA1

      104e64f4209120038eda0b7d98c902a3e1124201

    • SHA256

      43d4da1dd00d39bee6977222b604d1b79141ad6aaeef02b962cb858d5c62ba6b

    • SHA512

      811e367e997222645e7832bc29d86ad801d7a5ad385acef5bd811a01975fe5b0f6e91d7fba382665d7eeaebe5816af95bdf35a2b3bb0c1ccc741ebb20b11c081

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5F:Rh+ZkldDPK8YaKjF

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks