General

  • Target

    fad3d4bc220a8a2fd0eada26b90637c0N.exe

  • Size

    952KB

  • Sample

    240820-pzwl5swenm

  • MD5

    fad3d4bc220a8a2fd0eada26b90637c0

  • SHA1

    6f6235b58307516bc3292b66760e29de9a7e3c76

  • SHA256

    3ff89d13ca5bdcec69feb52ec01a49e92e699eebfdc1dab98aa71d4115c56df6

  • SHA512

    087a7c33d683b2e093d9bfceee92492f55a4911eb28580c0ccfd92b07a098c28d66383532a2d9be0254b4adc1008701d207369950f00a76e78814ad2abbd99c6

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT57:Rh+ZkldDPK8YaKj7

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      fad3d4bc220a8a2fd0eada26b90637c0N.exe

    • Size

      952KB

    • MD5

      fad3d4bc220a8a2fd0eada26b90637c0

    • SHA1

      6f6235b58307516bc3292b66760e29de9a7e3c76

    • SHA256

      3ff89d13ca5bdcec69feb52ec01a49e92e699eebfdc1dab98aa71d4115c56df6

    • SHA512

      087a7c33d683b2e093d9bfceee92492f55a4911eb28580c0ccfd92b07a098c28d66383532a2d9be0254b4adc1008701d207369950f00a76e78814ad2abbd99c6

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT57:Rh+ZkldDPK8YaKj7

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks