General

  • Target

    VirTool.Win32.AutInject.pz-65c972dc9f3043c073b7a301ce4b59eaab6813ac9ec4cb6893b2cded409b694eN

  • Size

    904KB

  • Sample

    240915-1aywrataqc

  • MD5

    54b19307ad2f268838a957bc488dd070

  • SHA1

    79800545fca440ec206f8ef9a9b009fddd3e7aa0

  • SHA256

    65c972dc9f3043c073b7a301ce4b59eaab6813ac9ec4cb6893b2cded409b694e

  • SHA512

    c3c487c40c6b814eaba9ce94f5a7212c49cdff64a2347d6fde40f30d96a8ff4e1657724eb8cac3f9390c711ecda9b10122fd26b6076910abeff99fc8705ec3af

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5D:gh+ZkldoPK8YaKGD

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      VirTool.Win32.AutInject.pz-65c972dc9f3043c073b7a301ce4b59eaab6813ac9ec4cb6893b2cded409b694eN

    • Size

      904KB

    • MD5

      54b19307ad2f268838a957bc488dd070

    • SHA1

      79800545fca440ec206f8ef9a9b009fddd3e7aa0

    • SHA256

      65c972dc9f3043c073b7a301ce4b59eaab6813ac9ec4cb6893b2cded409b694e

    • SHA512

      c3c487c40c6b814eaba9ce94f5a7212c49cdff64a2347d6fde40f30d96a8ff4e1657724eb8cac3f9390c711ecda9b10122fd26b6076910abeff99fc8705ec3af

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5D:gh+ZkldoPK8YaKGD

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks