General

  • Target

    b0b4b2b549c41a52dda785e797c76e5cea1881b15e458d42445564ce0b9a50c9

  • Size

    952KB

  • Sample

    240914-a5t8yayeph

  • MD5

    6c4d4d4ba951a195edc015fbef898a41

  • SHA1

    1fa836dd274ea6dfffed8fea43dfbe54d7419eda

  • SHA256

    b0b4b2b549c41a52dda785e797c76e5cea1881b15e458d42445564ce0b9a50c9

  • SHA512

    f07cc92431f61da051c0486e80883d73071e2de8079d38544e0936b19fbc4cc320a8aa18be26618b03e5f42bd1b909ec4f67ce58e89975ca017c4aa5ff40aea9

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5d:Rh+ZkldDPK8YaKjd

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      b0b4b2b549c41a52dda785e797c76e5cea1881b15e458d42445564ce0b9a50c9

    • Size

      952KB

    • MD5

      6c4d4d4ba951a195edc015fbef898a41

    • SHA1

      1fa836dd274ea6dfffed8fea43dfbe54d7419eda

    • SHA256

      b0b4b2b549c41a52dda785e797c76e5cea1881b15e458d42445564ce0b9a50c9

    • SHA512

      f07cc92431f61da051c0486e80883d73071e2de8079d38544e0936b19fbc4cc320a8aa18be26618b03e5f42bd1b909ec4f67ce58e89975ca017c4aa5ff40aea9

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5d:Rh+ZkldDPK8YaKjd

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks