General

  • Target

    3d126f0196ba00b17d314ebd2cff888ca800430c2398719befda678085920e2fN

  • Size

    952KB

  • Sample

    240927-2sr2lawdma

  • MD5

    42ad67d1b97237e17ddd9e3b9f666e50

  • SHA1

    eddb15b0263875f924f6635672b4a5423ee35780

  • SHA256

    3d126f0196ba00b17d314ebd2cff888ca800430c2398719befda678085920e2f

  • SHA512

    37a9d509ef419d59b128dd9874760fbf925d4ceda9b05465f7ed90115e85dcf6a0ca791b726c40285569c30a15a48c07a47713853dea60386f91724662b0253c

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5Y:Rh+ZkldDPK8YaKjY

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      3d126f0196ba00b17d314ebd2cff888ca800430c2398719befda678085920e2fN

    • Size

      952KB

    • MD5

      42ad67d1b97237e17ddd9e3b9f666e50

    • SHA1

      eddb15b0263875f924f6635672b4a5423ee35780

    • SHA256

      3d126f0196ba00b17d314ebd2cff888ca800430c2398719befda678085920e2f

    • SHA512

      37a9d509ef419d59b128dd9874760fbf925d4ceda9b05465f7ed90115e85dcf6a0ca791b726c40285569c30a15a48c07a47713853dea60386f91724662b0253c

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5Y:Rh+ZkldDPK8YaKjY

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks