General

  • Target

    d842289f33ddccdbdb3900d75776b1814e4a18e7f71d092bb0bafb6e7a95d3ceN

  • Size

    952KB

  • Sample

    240923-ardzss1blh

  • MD5

    86e7644c6b1b0e8a26edc45147eaae40

  • SHA1

    9019be59eae183e133985e40358f2c88fe68c480

  • SHA256

    d842289f33ddccdbdb3900d75776b1814e4a18e7f71d092bb0bafb6e7a95d3ce

  • SHA512

    501fb65acc4c571073278e633d2a26ec545ffaeae1dfa720eab40867ecc83c0c9a8114fb1f2fef36c3ff963b96d396e5492387a05ca8fce16dc3bf32f4d21325

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT54:Rh+ZkldDPK8YaKj4

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      d842289f33ddccdbdb3900d75776b1814e4a18e7f71d092bb0bafb6e7a95d3ceN

    • Size

      952KB

    • MD5

      86e7644c6b1b0e8a26edc45147eaae40

    • SHA1

      9019be59eae183e133985e40358f2c88fe68c480

    • SHA256

      d842289f33ddccdbdb3900d75776b1814e4a18e7f71d092bb0bafb6e7a95d3ce

    • SHA512

      501fb65acc4c571073278e633d2a26ec545ffaeae1dfa720eab40867ecc83c0c9a8114fb1f2fef36c3ff963b96d396e5492387a05ca8fce16dc3bf32f4d21325

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT54:Rh+ZkldDPK8YaKj4

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks