General

  • Target

    3ee9bb2a97d8c7c76420a9981dc9ac364b2a105c33abac60a0b0789f2d22fd21

  • Size

    952KB

  • Sample

    240925-zcwczawfnr

  • MD5

    ceb7415cfaf5ab864ef96492ad44adf8

  • SHA1

    57ccb5c4e283232a8811b926f9399ef9d512481a

  • SHA256

    3ee9bb2a97d8c7c76420a9981dc9ac364b2a105c33abac60a0b0789f2d22fd21

  • SHA512

    9cd9379026c52e80ef71d84d6c4d27b078fbff2eb07f88e9c11980b7399325aec22535d9de915ac9b77cadc0ab730a62dc8f490de8bea05cc70b6295a192f03f

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT53:Rh+ZkldDPK8YaKj3

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      3ee9bb2a97d8c7c76420a9981dc9ac364b2a105c33abac60a0b0789f2d22fd21

    • Size

      952KB

    • MD5

      ceb7415cfaf5ab864ef96492ad44adf8

    • SHA1

      57ccb5c4e283232a8811b926f9399ef9d512481a

    • SHA256

      3ee9bb2a97d8c7c76420a9981dc9ac364b2a105c33abac60a0b0789f2d22fd21

    • SHA512

      9cd9379026c52e80ef71d84d6c4d27b078fbff2eb07f88e9c11980b7399325aec22535d9de915ac9b77cadc0ab730a62dc8f490de8bea05cc70b6295a192f03f

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT53:Rh+ZkldDPK8YaKj3

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks