General

  • Target

    b07ebc073413433b463d1810fb7c58c0N.exe

  • Size

    952KB

  • Sample

    240902-2tfd7azarj

  • MD5

    b07ebc073413433b463d1810fb7c58c0

  • SHA1

    793e60f8fddb18a2c6a3e8c8a3546d905cfabdd4

  • SHA256

    a5abbb929e1056f0a03f304cf7638f723e1d0c80c7e7c97742068dbba7c275b5

  • SHA512

    bf7f2aedb9b56aa1c856e220ffd63d8e04b49aa88fb1f54f928bc8ad04770fa5b5d1b1666a6b7d5e89195f6aad79c2232502e672288a0d17c4814a1f0a7c490b

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5q:Rh+ZkldDPK8YaKjq

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      b07ebc073413433b463d1810fb7c58c0N.exe

    • Size

      952KB

    • MD5

      b07ebc073413433b463d1810fb7c58c0

    • SHA1

      793e60f8fddb18a2c6a3e8c8a3546d905cfabdd4

    • SHA256

      a5abbb929e1056f0a03f304cf7638f723e1d0c80c7e7c97742068dbba7c275b5

    • SHA512

      bf7f2aedb9b56aa1c856e220ffd63d8e04b49aa88fb1f54f928bc8ad04770fa5b5d1b1666a6b7d5e89195f6aad79c2232502e672288a0d17c4814a1f0a7c490b

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5q:Rh+ZkldDPK8YaKjq

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks