General

  • Target

    04c5e10c939eeb951bc9d1aa3355cf2f8220be6d19b117e98c95b154a2d334b4N

  • Size

    952KB

  • Sample

    240930-fc9e2stcla

  • MD5

    3e77f6a0be615de6f8ccf9f98abb6060

  • SHA1

    0cac4d65d0c1c83be0e9c587b96f05fbb01ce7a5

  • SHA256

    04c5e10c939eeb951bc9d1aa3355cf2f8220be6d19b117e98c95b154a2d334b4

  • SHA512

    23ce26c0442343e3860bd5d6b6643da31ccb64f5d9e410d94939c965701a13eb95cc7ebc72f2bd112e4d3575c4824a5d9a26603444047dc8be04d94cdbce1690

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5V:Rh+ZkldDPK8YaKjV

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      04c5e10c939eeb951bc9d1aa3355cf2f8220be6d19b117e98c95b154a2d334b4N

    • Size

      952KB

    • MD5

      3e77f6a0be615de6f8ccf9f98abb6060

    • SHA1

      0cac4d65d0c1c83be0e9c587b96f05fbb01ce7a5

    • SHA256

      04c5e10c939eeb951bc9d1aa3355cf2f8220be6d19b117e98c95b154a2d334b4

    • SHA512

      23ce26c0442343e3860bd5d6b6643da31ccb64f5d9e410d94939c965701a13eb95cc7ebc72f2bd112e4d3575c4824a5d9a26603444047dc8be04d94cdbce1690

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5V:Rh+ZkldDPK8YaKjV

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks