General

  • Target

    VirTool.Win32.AutInject.pz-06e95aa00102e42d2911038c120f5b50e75e83ad823476b52b811f7be1f0b464N

  • Size

    904KB

  • Sample

    240915-2yvdxaxdmr

  • MD5

    d440772fb246e9ccdaea3c5dddf81ac0

  • SHA1

    992c087d23b96b1945057960970bd613fa31144a

  • SHA256

    06e95aa00102e42d2911038c120f5b50e75e83ad823476b52b811f7be1f0b464

  • SHA512

    04a4d5ca5fff67a07a420d7ad37ad0d195494e29be69f52651c1d6ebe939beabc62bb9a04d7d1f6c14ab2547c74825fa8f242041bb04ee2b3332dc38bf9397fc

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa57:gh+ZkldoPK8YaKG7

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      VirTool.Win32.AutInject.pz-06e95aa00102e42d2911038c120f5b50e75e83ad823476b52b811f7be1f0b464N

    • Size

      904KB

    • MD5

      d440772fb246e9ccdaea3c5dddf81ac0

    • SHA1

      992c087d23b96b1945057960970bd613fa31144a

    • SHA256

      06e95aa00102e42d2911038c120f5b50e75e83ad823476b52b811f7be1f0b464

    • SHA512

      04a4d5ca5fff67a07a420d7ad37ad0d195494e29be69f52651c1d6ebe939beabc62bb9a04d7d1f6c14ab2547c74825fa8f242041bb04ee2b3332dc38bf9397fc

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa57:gh+ZkldoPK8YaKG7

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks