General

  • Target

    Trojan.Win32.Nanocore.NE.MTB-0ffa135ea3dff9a98fd11a812d750085e5bc13c6e394b0d80cd4ecbe80434abdN

  • Size

    952KB

  • Sample

    240917-wcdw5swdjl

  • MD5

    52facb54dca9bbdc5736d5b53bbe5470

  • SHA1

    35e59f949b25e35383cea968cf6a605d1aa5c56a

  • SHA256

    0ffa135ea3dff9a98fd11a812d750085e5bc13c6e394b0d80cd4ecbe80434abd

  • SHA512

    96296e10ef5ec0fed818feaa96c4a18877d0fb4b29a1b97eb6bd23ba95afa75209fa8dc32603a50c1b271a02f784a2246e28d16525b54adc9a6e2b281fbf30c2

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5I:Rh+ZkldDPK8YaKjI

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      Trojan.Win32.Nanocore.NE.MTB-0ffa135ea3dff9a98fd11a812d750085e5bc13c6e394b0d80cd4ecbe80434abdN

    • Size

      952KB

    • MD5

      52facb54dca9bbdc5736d5b53bbe5470

    • SHA1

      35e59f949b25e35383cea968cf6a605d1aa5c56a

    • SHA256

      0ffa135ea3dff9a98fd11a812d750085e5bc13c6e394b0d80cd4ecbe80434abd

    • SHA512

      96296e10ef5ec0fed818feaa96c4a18877d0fb4b29a1b97eb6bd23ba95afa75209fa8dc32603a50c1b271a02f784a2246e28d16525b54adc9a6e2b281fbf30c2

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5I:Rh+ZkldDPK8YaKjI

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks