General

  • Target

    Trojan.Win32.Nanocore.NE.MTB-a2779123173f106858777236ac5d21e2636f754e1e7e4ba572c1166cab2d7c6cN

  • Size

    952KB

  • Sample

    240916-xgk2patfpd

  • MD5

    604743defd2113c9eb7c1cda411e1820

  • SHA1

    121cfc9916d70365d351bfa857aa17a9a427de03

  • SHA256

    a2779123173f106858777236ac5d21e2636f754e1e7e4ba572c1166cab2d7c6c

  • SHA512

    f88c812f8e31af9eea86dd3d0cee6ba693c3d208a63fa7595849e886ef3dfab44a3dab573bce304a937c1a83aa106e95e0a9753ba9eb1ce48a5740cb81f23221

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5P:Rh+ZkldDPK8YaKjP

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      Trojan.Win32.Nanocore.NE.MTB-a2779123173f106858777236ac5d21e2636f754e1e7e4ba572c1166cab2d7c6cN

    • Size

      952KB

    • MD5

      604743defd2113c9eb7c1cda411e1820

    • SHA1

      121cfc9916d70365d351bfa857aa17a9a427de03

    • SHA256

      a2779123173f106858777236ac5d21e2636f754e1e7e4ba572c1166cab2d7c6c

    • SHA512

      f88c812f8e31af9eea86dd3d0cee6ba693c3d208a63fa7595849e886ef3dfab44a3dab573bce304a937c1a83aa106e95e0a9753ba9eb1ce48a5740cb81f23221

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5P:Rh+ZkldDPK8YaKjP

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks