General

  • Target

    6953204a5b7733e343ff0901978f9e1c85b3a627b2e6294791abf315244517edN

  • Size

    952KB

  • Sample

    240928-b8gmpashpg

  • MD5

    43806cd5a96cffe2e1a1a99c17c27320

  • SHA1

    755f740ca203dcaa7ec87187ff6f6a76e8bf568b

  • SHA256

    6953204a5b7733e343ff0901978f9e1c85b3a627b2e6294791abf315244517ed

  • SHA512

    ebdbd6d2e91fca714949048f3a3b27ba06f8b32ebc84a5ed05bc2b8c54253673f8b9fe1944b2f7d082117f9d06be0ed8ed726af5306aba1a46d487d20a74a21f

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT51:Rh+ZkldDPK8YaKj1

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      6953204a5b7733e343ff0901978f9e1c85b3a627b2e6294791abf315244517edN

    • Size

      952KB

    • MD5

      43806cd5a96cffe2e1a1a99c17c27320

    • SHA1

      755f740ca203dcaa7ec87187ff6f6a76e8bf568b

    • SHA256

      6953204a5b7733e343ff0901978f9e1c85b3a627b2e6294791abf315244517ed

    • SHA512

      ebdbd6d2e91fca714949048f3a3b27ba06f8b32ebc84a5ed05bc2b8c54253673f8b9fe1944b2f7d082117f9d06be0ed8ed726af5306aba1a46d487d20a74a21f

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT51:Rh+ZkldDPK8YaKj1

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks