General

  • Target

    8ab344113ede2619f65ec5cf9990382e6eb1f2e96bef9041075f35b506482c40N

  • Size

    952KB

  • Sample

    241001-rqvplaxhqb

  • MD5

    8d13f969deef51e5006aaa09dd9708e0

  • SHA1

    fd9eb0eaf6212ab93bc1135454cd9073b845ae86

  • SHA256

    8ab344113ede2619f65ec5cf9990382e6eb1f2e96bef9041075f35b506482c40

  • SHA512

    8906a4cc9fb422ffa975ebaa41f74f08c064d9e40d6c6c9ce57b245783a842ea4ba3a5dd750de8a04df5b72b309f648d8df340b079ffbfe79a4239372cc96a53

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT52:Rh+ZkldDPK8YaKj2

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      8ab344113ede2619f65ec5cf9990382e6eb1f2e96bef9041075f35b506482c40N

    • Size

      952KB

    • MD5

      8d13f969deef51e5006aaa09dd9708e0

    • SHA1

      fd9eb0eaf6212ab93bc1135454cd9073b845ae86

    • SHA256

      8ab344113ede2619f65ec5cf9990382e6eb1f2e96bef9041075f35b506482c40

    • SHA512

      8906a4cc9fb422ffa975ebaa41f74f08c064d9e40d6c6c9ce57b245783a842ea4ba3a5dd750de8a04df5b72b309f648d8df340b079ffbfe79a4239372cc96a53

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT52:Rh+ZkldDPK8YaKj2

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks