General

  • Target

    5ca091e628cffbb6bbf8abda0dce9e0768ad2706008aaab8f8a403d8d484e0e6N

  • Size

    952KB

  • Sample

    241001-2vlmlavcrr

  • MD5

    41ef07ac5770514d600bd1801733f5a0

  • SHA1

    6f7b9981c205d20b4759605cfb94dc4a57caab7a

  • SHA256

    5ca091e628cffbb6bbf8abda0dce9e0768ad2706008aaab8f8a403d8d484e0e6

  • SHA512

    27f0cd2cd17d0a2c0ff750c57d7bdb5f3bff47218b330ba033f09a13dee086134cab4eee6263b8983d4e4eba8674f233957f01a5afe9f1516d74c8b2770b9594

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5b:Rh+ZkldDPK8YaKjb

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      5ca091e628cffbb6bbf8abda0dce9e0768ad2706008aaab8f8a403d8d484e0e6N

    • Size

      952KB

    • MD5

      41ef07ac5770514d600bd1801733f5a0

    • SHA1

      6f7b9981c205d20b4759605cfb94dc4a57caab7a

    • SHA256

      5ca091e628cffbb6bbf8abda0dce9e0768ad2706008aaab8f8a403d8d484e0e6

    • SHA512

      27f0cd2cd17d0a2c0ff750c57d7bdb5f3bff47218b330ba033f09a13dee086134cab4eee6263b8983d4e4eba8674f233957f01a5afe9f1516d74c8b2770b9594

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5b:Rh+ZkldDPK8YaKjb

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks