General

  • Target

    VirTool.Win32.AutInject.pz-779df7f5f534436656d02bb9f20f4197a2379624c8c277b159e6ac40c56e3494N

  • Size

    904KB

  • Sample

    240916-wref8asble

  • MD5

    14c62a4d88f720d008da45e6c7d9e2f0

  • SHA1

    723411892ef2da8c18bf7dc2214eb41cc4c8d6ee

  • SHA256

    779df7f5f534436656d02bb9f20f4197a2379624c8c277b159e6ac40c56e3494

  • SHA512

    980d49c90c03fefe33335539e770c878d07f3a64164f1645a6589d7d1a26c64beac04c54e1d3754d52ac55d5f8b2fec6a7cc9686921163d4f4bbd2c27325c814

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5X:gh+ZkldoPK8YaKGX

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      VirTool.Win32.AutInject.pz-779df7f5f534436656d02bb9f20f4197a2379624c8c277b159e6ac40c56e3494N

    • Size

      904KB

    • MD5

      14c62a4d88f720d008da45e6c7d9e2f0

    • SHA1

      723411892ef2da8c18bf7dc2214eb41cc4c8d6ee

    • SHA256

      779df7f5f534436656d02bb9f20f4197a2379624c8c277b159e6ac40c56e3494

    • SHA512

      980d49c90c03fefe33335539e770c878d07f3a64164f1645a6589d7d1a26c64beac04c54e1d3754d52ac55d5f8b2fec6a7cc9686921163d4f4bbd2c27325c814

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5X:gh+ZkldoPK8YaKGX

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks