General

  • Target

    Trojan.Win32.Nanocore.NE.MTB-f7f0f09df83302234837984bfe850a1d873af9a9a004472da414aa3d39c5cf07N

  • Size

    952KB

  • Sample

    240915-26q2fsxckb

  • MD5

    1e682cd72a750f31fb5910f5d4227710

  • SHA1

    d6d0c12b7e2bac5b35871343be38bbd18ad552ef

  • SHA256

    f7f0f09df83302234837984bfe850a1d873af9a9a004472da414aa3d39c5cf07

  • SHA512

    c549689e944cc9372abaf3417ea2328e3d5e0cf5a2ccdd04396c07ebccd370e7383bf0f498b48b98589a7f5e864afa133ccfa721364f8273b97ccd76ad71e871

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5o:Rh+ZkldDPK8YaKjo

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      Trojan.Win32.Nanocore.NE.MTB-f7f0f09df83302234837984bfe850a1d873af9a9a004472da414aa3d39c5cf07N

    • Size

      952KB

    • MD5

      1e682cd72a750f31fb5910f5d4227710

    • SHA1

      d6d0c12b7e2bac5b35871343be38bbd18ad552ef

    • SHA256

      f7f0f09df83302234837984bfe850a1d873af9a9a004472da414aa3d39c5cf07

    • SHA512

      c549689e944cc9372abaf3417ea2328e3d5e0cf5a2ccdd04396c07ebccd370e7383bf0f498b48b98589a7f5e864afa133ccfa721364f8273b97ccd76ad71e871

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5o:Rh+ZkldDPK8YaKjo

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks