General

  • Target

    a0f050e4f13a6cfaff7a6dea07068040N.exe

  • Size

    952KB

  • Sample

    240905-b1qwds1hnf

  • MD5

    a0f050e4f13a6cfaff7a6dea07068040

  • SHA1

    b62049882a595faa3e8a9f30fa84c58836070fc9

  • SHA256

    d4fa8360c3af233e50aab24ba64a999659b51f10d3759f7fee6176f6e4ccd207

  • SHA512

    6e42b7ea318737aa27b201c772305b4d13f5a2be20d480bb49bbc3fbed2fcfa953dc816513818f35d6cb811a49ba089be5a22d4c8f26f41315c97cb4d26144cd

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5H:Rh+ZkldDPK8YaKjH

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      a0f050e4f13a6cfaff7a6dea07068040N.exe

    • Size

      952KB

    • MD5

      a0f050e4f13a6cfaff7a6dea07068040

    • SHA1

      b62049882a595faa3e8a9f30fa84c58836070fc9

    • SHA256

      d4fa8360c3af233e50aab24ba64a999659b51f10d3759f7fee6176f6e4ccd207

    • SHA512

      6e42b7ea318737aa27b201c772305b4d13f5a2be20d480bb49bbc3fbed2fcfa953dc816513818f35d6cb811a49ba089be5a22d4c8f26f41315c97cb4d26144cd

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5H:Rh+ZkldDPK8YaKjH

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks