General

  • Target

    36415e27f12d5ea484f81c29f87602a4cceb029016ac540be5089f907d028939N

  • Size

    952KB

  • Sample

    240928-v2veraxepn

  • MD5

    c6517eb4dfa3f362314251eb42e48c00

  • SHA1

    88f2d43c1b40da9b81e9e0410bc29016c6166efb

  • SHA256

    36415e27f12d5ea484f81c29f87602a4cceb029016ac540be5089f907d028939

  • SHA512

    b3db2c4b378cb8fa812bd9aec6049246ca4d2a0a65dbe6370c432c4cad5a155e9c9161b4dc627536a7072dd629206948dac5f0f69b5807dd0a3239b189022d04

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5g:Rh+ZkldDPK8YaKjg

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      36415e27f12d5ea484f81c29f87602a4cceb029016ac540be5089f907d028939N

    • Size

      952KB

    • MD5

      c6517eb4dfa3f362314251eb42e48c00

    • SHA1

      88f2d43c1b40da9b81e9e0410bc29016c6166efb

    • SHA256

      36415e27f12d5ea484f81c29f87602a4cceb029016ac540be5089f907d028939

    • SHA512

      b3db2c4b378cb8fa812bd9aec6049246ca4d2a0a65dbe6370c432c4cad5a155e9c9161b4dc627536a7072dd629206948dac5f0f69b5807dd0a3239b189022d04

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5g:Rh+ZkldDPK8YaKjg

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks