General

  • Target

    Trojan.Win32.Nanocore.NE.MTB-6652b6bb890ae2a0fca74a28811a5569d100d51bb2bd7e7681d7bdaea5126672N

  • Size

    952KB

  • Sample

    240916-qz3k5a1bkm

  • MD5

    6eb7ba546c34db675d22651bf5dc7570

  • SHA1

    37ac1c862929099e3723a84cc97b9ad5b2a686b3

  • SHA256

    6652b6bb890ae2a0fca74a28811a5569d100d51bb2bd7e7681d7bdaea5126672

  • SHA512

    ece06bb2f3ada13915aa4236804e2ad33ef7d5cf0ee5872f2c85c80e3464838ce45a83e98920dced10c314198ba88c144ed6dfdf860cec6f6d3d2c630fc95cbc

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5Q:Rh+ZkldDPK8YaKjQ

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      Trojan.Win32.Nanocore.NE.MTB-6652b6bb890ae2a0fca74a28811a5569d100d51bb2bd7e7681d7bdaea5126672N

    • Size

      952KB

    • MD5

      6eb7ba546c34db675d22651bf5dc7570

    • SHA1

      37ac1c862929099e3723a84cc97b9ad5b2a686b3

    • SHA256

      6652b6bb890ae2a0fca74a28811a5569d100d51bb2bd7e7681d7bdaea5126672

    • SHA512

      ece06bb2f3ada13915aa4236804e2ad33ef7d5cf0ee5872f2c85c80e3464838ce45a83e98920dced10c314198ba88c144ed6dfdf860cec6f6d3d2c630fc95cbc

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5Q:Rh+ZkldDPK8YaKjQ

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks