General

  • Target

    e4b546a32afd4ee0d3884fef6d3a8fc2ed4f559710cca43c95b57042e48306caN.exe

  • Size

    952KB

  • Sample

    240926-fqr3xsygrm

  • MD5

    5a084c794288c782cfdb886bc4a179d0

  • SHA1

    da1df6591c01097a82b7c7799c71db2de9bf3ae1

  • SHA256

    e4b546a32afd4ee0d3884fef6d3a8fc2ed4f559710cca43c95b57042e48306ca

  • SHA512

    2dc20162a9ac0c4a6c84e8cd3ba1b5e2e8466b3d94f5d1615d4219310adc0fba4dae730125ace3bbe70f7ee207ed29ca7b818d862fce1614c72ab3b875be9412

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5C:Rh+ZkldDPK8YaKjC

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      e4b546a32afd4ee0d3884fef6d3a8fc2ed4f559710cca43c95b57042e48306caN.exe

    • Size

      952KB

    • MD5

      5a084c794288c782cfdb886bc4a179d0

    • SHA1

      da1df6591c01097a82b7c7799c71db2de9bf3ae1

    • SHA256

      e4b546a32afd4ee0d3884fef6d3a8fc2ed4f559710cca43c95b57042e48306ca

    • SHA512

      2dc20162a9ac0c4a6c84e8cd3ba1b5e2e8466b3d94f5d1615d4219310adc0fba4dae730125ace3bbe70f7ee207ed29ca7b818d862fce1614c72ab3b875be9412

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5C:Rh+ZkldDPK8YaKjC

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks