General

  • Target

    2cf08387c2768e1b33bbfa16f5510f8a20c0c2711d9c48a95ec3c586bbe52b22

  • Size

    952KB

  • Sample

    240922-ylxrqaveqq

  • MD5

    27c9b3138cdfd6bfa561c22b254b7119

  • SHA1

    fdcd40c9b29030fd92f4c17ad84836d490d69cb4

  • SHA256

    2cf08387c2768e1b33bbfa16f5510f8a20c0c2711d9c48a95ec3c586bbe52b22

  • SHA512

    354002de2213329328d7ad80a04804859580fb9596bd202a029f7b4b01c38654f2221b29c2d968ae48bbd3731beef1730c2e0c870399009140b60e3e6fcf4b3b

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5m:Rh+ZkldDPK8YaKjm

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      2cf08387c2768e1b33bbfa16f5510f8a20c0c2711d9c48a95ec3c586bbe52b22

    • Size

      952KB

    • MD5

      27c9b3138cdfd6bfa561c22b254b7119

    • SHA1

      fdcd40c9b29030fd92f4c17ad84836d490d69cb4

    • SHA256

      2cf08387c2768e1b33bbfa16f5510f8a20c0c2711d9c48a95ec3c586bbe52b22

    • SHA512

      354002de2213329328d7ad80a04804859580fb9596bd202a029f7b4b01c38654f2221b29c2d968ae48bbd3731beef1730c2e0c870399009140b60e3e6fcf4b3b

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5m:Rh+ZkldDPK8YaKjm

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks