General

  • Target

    895cff49612a352da9e47e32df7f7cc0947736e9545b199c515acb548bca3832N

  • Size

    952KB

  • Sample

    240927-m1enxa1gqc

  • MD5

    447779937507b609e67e32f97532ee50

  • SHA1

    3a2f0db3be999ad0746dc6e574ef3be91cedeb9e

  • SHA256

    895cff49612a352da9e47e32df7f7cc0947736e9545b199c515acb548bca3832

  • SHA512

    845df40292337fda9064fdbd27af45beb428412e9ee22e4a9dee2def785f2feda509ae71827ebcb57041e1b0fa5ba176e419addc7885f6c278db793863fd629e

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5a:Rh+ZkldDPK8YaKja

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      895cff49612a352da9e47e32df7f7cc0947736e9545b199c515acb548bca3832N

    • Size

      952KB

    • MD5

      447779937507b609e67e32f97532ee50

    • SHA1

      3a2f0db3be999ad0746dc6e574ef3be91cedeb9e

    • SHA256

      895cff49612a352da9e47e32df7f7cc0947736e9545b199c515acb548bca3832

    • SHA512

      845df40292337fda9064fdbd27af45beb428412e9ee22e4a9dee2def785f2feda509ae71827ebcb57041e1b0fa5ba176e419addc7885f6c278db793863fd629e

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5a:Rh+ZkldDPK8YaKja

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks