General

  • Target

    3c2df6f4b955040d236c8faa0f75b83824bd9b6a80cd811955dd45f2be289a3e

  • Size

    952KB

  • Sample

    240928-zj7pksvhrp

  • MD5

    70376058a9929589517752db72eb58c2

  • SHA1

    8581668e84cc13dee2f7a684adcae402213eccca

  • SHA256

    3c2df6f4b955040d236c8faa0f75b83824bd9b6a80cd811955dd45f2be289a3e

  • SHA512

    7628def857800f40ded77d2dbc5fe85d417bc700a53e1432c75cef5c589b9fc2ae9499a64eef04dc2dc6e4c44bf96fb3299f5f63953e26fec14b3c580c05de9b

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5j:Rh+ZkldDPK8YaKjj

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      3c2df6f4b955040d236c8faa0f75b83824bd9b6a80cd811955dd45f2be289a3e

    • Size

      952KB

    • MD5

      70376058a9929589517752db72eb58c2

    • SHA1

      8581668e84cc13dee2f7a684adcae402213eccca

    • SHA256

      3c2df6f4b955040d236c8faa0f75b83824bd9b6a80cd811955dd45f2be289a3e

    • SHA512

      7628def857800f40ded77d2dbc5fe85d417bc700a53e1432c75cef5c589b9fc2ae9499a64eef04dc2dc6e4c44bf96fb3299f5f63953e26fec14b3c580c05de9b

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5j:Rh+ZkldDPK8YaKjj

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks