General

  • Target

    f16f0b0397f40daecf482472edc06870N.exe

  • Size

    952KB

  • Sample

    240824-pljena1gqq

  • MD5

    f16f0b0397f40daecf482472edc06870

  • SHA1

    96181a67d872286815b1beb127a61267ffaec7d9

  • SHA256

    010b76048cadab79756084a9928ffdc5c4f55a3ac997e97492b83b32993bbac6

  • SHA512

    63a3348331defde3054414723bbdc68cb7f2a99acb9636ae76f36a557e42b616b647f72a0dc06e17806c8a34a82577fe8e13963b4879d319eca04d1014083c40

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5P:Rh+ZkldDPK8YaKjP

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      f16f0b0397f40daecf482472edc06870N.exe

    • Size

      952KB

    • MD5

      f16f0b0397f40daecf482472edc06870

    • SHA1

      96181a67d872286815b1beb127a61267ffaec7d9

    • SHA256

      010b76048cadab79756084a9928ffdc5c4f55a3ac997e97492b83b32993bbac6

    • SHA512

      63a3348331defde3054414723bbdc68cb7f2a99acb9636ae76f36a557e42b616b647f72a0dc06e17806c8a34a82577fe8e13963b4879d319eca04d1014083c40

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5P:Rh+ZkldDPK8YaKjP

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks