General

  • Target

    aa28fcbb8ddf14b253cfd4f6c4d13240N.exe

  • Size

    952KB

  • Sample

    240913-nt2qjazfmb

  • MD5

    aa28fcbb8ddf14b253cfd4f6c4d13240

  • SHA1

    de4e37bd5f6b935fe798b35dc02291e1bbd9fc82

  • SHA256

    0d253a89a0c37b1ad3ce50dc6ff1bb7a16ee1930aada0304d3f1a4ab0db3ebb2

  • SHA512

    f6a2ce07fc9afc03235b59ddd4bd999dfee8fc97c2c53e07be6e60e2dc34864c38292907e851508194c86ce00b892273fc001b0262d40b89f2b9c105155ca3ec

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5t:Rh+ZkldDPK8YaKjt

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      aa28fcbb8ddf14b253cfd4f6c4d13240N.exe

    • Size

      952KB

    • MD5

      aa28fcbb8ddf14b253cfd4f6c4d13240

    • SHA1

      de4e37bd5f6b935fe798b35dc02291e1bbd9fc82

    • SHA256

      0d253a89a0c37b1ad3ce50dc6ff1bb7a16ee1930aada0304d3f1a4ab0db3ebb2

    • SHA512

      f6a2ce07fc9afc03235b59ddd4bd999dfee8fc97c2c53e07be6e60e2dc34864c38292907e851508194c86ce00b892273fc001b0262d40b89f2b9c105155ca3ec

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5t:Rh+ZkldDPK8YaKjt

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks