General

  • Target

    b895542b2e783ca981cfd9d198f7246767e833b376f34ed79e83a590c552ffd3N.exe

  • Size

    952KB

  • Sample

    240925-hdnk3stcnh

  • MD5

    74453e91b93aa3bb046c71aa36da4670

  • SHA1

    f3c1ac5e82085c3626c998a9458783fee6833982

  • SHA256

    b895542b2e783ca981cfd9d198f7246767e833b376f34ed79e83a590c552ffd3

  • SHA512

    36ec87d6dec274959943d7eff88f300cf2cbd4951d2a92c5d7312ee527e460b8960043f8e5c1e0744b2b2af987a7c9f925f4f0985c5f6947ffe8b1b9bf6541f9

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT51:Rh+ZkldDPK8YaKj1

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      b895542b2e783ca981cfd9d198f7246767e833b376f34ed79e83a590c552ffd3N.exe

    • Size

      952KB

    • MD5

      74453e91b93aa3bb046c71aa36da4670

    • SHA1

      f3c1ac5e82085c3626c998a9458783fee6833982

    • SHA256

      b895542b2e783ca981cfd9d198f7246767e833b376f34ed79e83a590c552ffd3

    • SHA512

      36ec87d6dec274959943d7eff88f300cf2cbd4951d2a92c5d7312ee527e460b8960043f8e5c1e0744b2b2af987a7c9f925f4f0985c5f6947ffe8b1b9bf6541f9

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT51:Rh+ZkldDPK8YaKj1

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks