General

  • Target

    16ef98259625a713a9c36b108ae1812f22ff49b7aaa4fe05746ec3ebf009c7bd

  • Size

    952KB

  • Sample

    240925-xme3masakl

  • MD5

    2e04bef77df49a67f294efc0f2396ee0

  • SHA1

    abcc41bb238223f9992c522a891dbedc2f312673

  • SHA256

    16ef98259625a713a9c36b108ae1812f22ff49b7aaa4fe05746ec3ebf009c7bd

  • SHA512

    f1a2fb904cd75b85024ae9bc6fd3c5dadefbf657823b4e2b40904869e00a8d6872ea75cbf9a63f6a352752b3dbacd2716d720648303f0f05e0ddf1041a456af7

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5o:Rh+ZkldDPK8YaKjo

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      16ef98259625a713a9c36b108ae1812f22ff49b7aaa4fe05746ec3ebf009c7bd

    • Size

      952KB

    • MD5

      2e04bef77df49a67f294efc0f2396ee0

    • SHA1

      abcc41bb238223f9992c522a891dbedc2f312673

    • SHA256

      16ef98259625a713a9c36b108ae1812f22ff49b7aaa4fe05746ec3ebf009c7bd

    • SHA512

      f1a2fb904cd75b85024ae9bc6fd3c5dadefbf657823b4e2b40904869e00a8d6872ea75cbf9a63f6a352752b3dbacd2716d720648303f0f05e0ddf1041a456af7

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5o:Rh+ZkldDPK8YaKjo

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks