General

  • Target

    c1825e55496fa977dcfccff762fc6cd7d465a1e09e9171f69680d1c9ffce9235N.exe

  • Size

    952KB

  • Sample

    240925-pzch9swcnr

  • MD5

    9b62bb919cf857703e09ff6c25f8a660

  • SHA1

    12666d740e8e6073d1b33c656f58eb477d1d2ca5

  • SHA256

    c1825e55496fa977dcfccff762fc6cd7d465a1e09e9171f69680d1c9ffce9235

  • SHA512

    cc371fc6fb3f5e09d29480ec3b677fad4188450f7c76d01a92338f0d4f088bc7c9fed5be464703e71bd74914ae2ba165ef89f1d71aa652eccec43b6c05213138

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5C:Rh+ZkldDPK8YaKjC

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      c1825e55496fa977dcfccff762fc6cd7d465a1e09e9171f69680d1c9ffce9235N.exe

    • Size

      952KB

    • MD5

      9b62bb919cf857703e09ff6c25f8a660

    • SHA1

      12666d740e8e6073d1b33c656f58eb477d1d2ca5

    • SHA256

      c1825e55496fa977dcfccff762fc6cd7d465a1e09e9171f69680d1c9ffce9235

    • SHA512

      cc371fc6fb3f5e09d29480ec3b677fad4188450f7c76d01a92338f0d4f088bc7c9fed5be464703e71bd74914ae2ba165ef89f1d71aa652eccec43b6c05213138

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5C:Rh+ZkldDPK8YaKjC

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks