General

  • Target

    c53fff287328e97c6d2b23a9b8f4ede714ba2d1460b22f4cdc66403fa9852ff3

  • Size

    952KB

  • Sample

    240923-brh47asemr

  • MD5

    23bd46b628356f3e22aa09db0d366ad4

  • SHA1

    92417a3f46d13f937f19e6a6756717f070792b8f

  • SHA256

    c53fff287328e97c6d2b23a9b8f4ede714ba2d1460b22f4cdc66403fa9852ff3

  • SHA512

    55d402b2b20836dee9c381db20e20d6f116e38cf150c26cc36d4cfda704dc3b01f40c8bb98a81f6b07f36f4dc6f8e6fffacc3015b3035ca74c0ca3666bb84472

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5E:Rh+ZkldDPK8YaKjE

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      c53fff287328e97c6d2b23a9b8f4ede714ba2d1460b22f4cdc66403fa9852ff3

    • Size

      952KB

    • MD5

      23bd46b628356f3e22aa09db0d366ad4

    • SHA1

      92417a3f46d13f937f19e6a6756717f070792b8f

    • SHA256

      c53fff287328e97c6d2b23a9b8f4ede714ba2d1460b22f4cdc66403fa9852ff3

    • SHA512

      55d402b2b20836dee9c381db20e20d6f116e38cf150c26cc36d4cfda704dc3b01f40c8bb98a81f6b07f36f4dc6f8e6fffacc3015b3035ca74c0ca3666bb84472

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5E:Rh+ZkldDPK8YaKjE

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks