General

  • Target

    47b2d8cd96d01b94b7810dcbaa2a0a2d41d23b3ac07c2bedcfbcac22c8f74c2c

  • Size

    952KB

  • Sample

    240918-zxp2patdrp

  • MD5

    e01f88cb4bb543d09e14e4775f9441c4

  • SHA1

    77846ea4548c37343c9674dc2e770728c143a630

  • SHA256

    47b2d8cd96d01b94b7810dcbaa2a0a2d41d23b3ac07c2bedcfbcac22c8f74c2c

  • SHA512

    a2641976e5b90a291d43b4e5cf53492dd1cd8e1cef6d72fe3d1ef0ec3a3db923a710c2f695f9cff9cc1c3d5ddbf7f0ccb2b82a8230cbba91772e87904d669f1e

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5j:Rh+ZkldDPK8YaKjj

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      47b2d8cd96d01b94b7810dcbaa2a0a2d41d23b3ac07c2bedcfbcac22c8f74c2c

    • Size

      952KB

    • MD5

      e01f88cb4bb543d09e14e4775f9441c4

    • SHA1

      77846ea4548c37343c9674dc2e770728c143a630

    • SHA256

      47b2d8cd96d01b94b7810dcbaa2a0a2d41d23b3ac07c2bedcfbcac22c8f74c2c

    • SHA512

      a2641976e5b90a291d43b4e5cf53492dd1cd8e1cef6d72fe3d1ef0ec3a3db923a710c2f695f9cff9cc1c3d5ddbf7f0ccb2b82a8230cbba91772e87904d669f1e

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5j:Rh+ZkldDPK8YaKjj

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks