General

  • Target

    Trojan.Win32.Nanocore.NE.MTB-b232c0b72ad60d38756fbfb76c166086beef2e3e0a436ebe63a9529cd8be5c5fN

  • Size

    952KB

  • Sample

    240916-n6xbkswfln

  • MD5

    dadc18714b5e3dc35b47f19038c02910

  • SHA1

    88ea8fe5925c79c918188e5de8f7497865034f24

  • SHA256

    b232c0b72ad60d38756fbfb76c166086beef2e3e0a436ebe63a9529cd8be5c5f

  • SHA512

    35382bf7a53491140a1038c8b7b1699c7bc3b4ad7fc15b617d381ebd63810e408e1bc449468537cb508fb6ffd0d96bc3ff4ceb350cafcd63d919fb35f5b278cb

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5B:Rh+ZkldDPK8YaKjB

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      Trojan.Win32.Nanocore.NE.MTB-b232c0b72ad60d38756fbfb76c166086beef2e3e0a436ebe63a9529cd8be5c5fN

    • Size

      952KB

    • MD5

      dadc18714b5e3dc35b47f19038c02910

    • SHA1

      88ea8fe5925c79c918188e5de8f7497865034f24

    • SHA256

      b232c0b72ad60d38756fbfb76c166086beef2e3e0a436ebe63a9529cd8be5c5f

    • SHA512

      35382bf7a53491140a1038c8b7b1699c7bc3b4ad7fc15b617d381ebd63810e408e1bc449468537cb508fb6ffd0d96bc3ff4ceb350cafcd63d919fb35f5b278cb

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5B:Rh+ZkldDPK8YaKjB

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks