General

  • Target

    a691f6f8e00fdd33e850cd44f5c5f4692c82954afdaf185b7d939e1f7f39c306

  • Size

    952KB

  • Sample

    240817-dy8pjavckg

  • MD5

    875bfdd35ae8cdff0f9706a5afcc2b68

  • SHA1

    78e400708a15acb8a770ac44c543766cff5f8760

  • SHA256

    a691f6f8e00fdd33e850cd44f5c5f4692c82954afdaf185b7d939e1f7f39c306

  • SHA512

    d19e628fcbeb0c35fc07fabb5bff3ea2e2a45da10603716281b92643ef8b97e85eb5b23f751a75a22edbb4aecd8692ffafed13bffca6d4c83658934093ea1329

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5w:Rh+ZkldDPK8YaKjw

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      a691f6f8e00fdd33e850cd44f5c5f4692c82954afdaf185b7d939e1f7f39c306

    • Size

      952KB

    • MD5

      875bfdd35ae8cdff0f9706a5afcc2b68

    • SHA1

      78e400708a15acb8a770ac44c543766cff5f8760

    • SHA256

      a691f6f8e00fdd33e850cd44f5c5f4692c82954afdaf185b7d939e1f7f39c306

    • SHA512

      d19e628fcbeb0c35fc07fabb5bff3ea2e2a45da10603716281b92643ef8b97e85eb5b23f751a75a22edbb4aecd8692ffafed13bffca6d4c83658934093ea1329

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5w:Rh+ZkldDPK8YaKjw

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks