General

  • Target

    9e7087c043105eb32302beda913c475e8b7825d017cc6be68c2ba742af66c084N

  • Size

    952KB

  • Sample

    241002-bn7y5stejh

  • MD5

    c4f78cceb8cf0238ec2e3ea60d10c640

  • SHA1

    aa1395d3f6e1df03a6ac299cc54d5c1501837bc8

  • SHA256

    9e7087c043105eb32302beda913c475e8b7825d017cc6be68c2ba742af66c084

  • SHA512

    5a79a786647699ad612216ee35ce0af4aa7de203ce4238a8e8e228735bb7a09e6f7bfbd598b7b8059654ad0e03ed257bc0be153dc929c8ad68e94da67addd6ba

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5Y:Rh+ZkldDPK8YaKjY

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      9e7087c043105eb32302beda913c475e8b7825d017cc6be68c2ba742af66c084N

    • Size

      952KB

    • MD5

      c4f78cceb8cf0238ec2e3ea60d10c640

    • SHA1

      aa1395d3f6e1df03a6ac299cc54d5c1501837bc8

    • SHA256

      9e7087c043105eb32302beda913c475e8b7825d017cc6be68c2ba742af66c084

    • SHA512

      5a79a786647699ad612216ee35ce0af4aa7de203ce4238a8e8e228735bb7a09e6f7bfbd598b7b8059654ad0e03ed257bc0be153dc929c8ad68e94da67addd6ba

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5Y:Rh+ZkldDPK8YaKjY

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks