General

  • Target

    2cc5e8580b5dc52a924dd88068acd5f01024981dcb7a6ef335714565687bff1dN

  • Size

    952KB

  • Sample

    241002-p2v4dswhql

  • MD5

    a45fccf899ae83c39e790220ac813fd0

  • SHA1

    232e90bfb8ba82a64b7144d4f4d7f5f45d254b20

  • SHA256

    2cc5e8580b5dc52a924dd88068acd5f01024981dcb7a6ef335714565687bff1d

  • SHA512

    58696b944352e5bf59d82978bf421e7adefedf52065bf0e7d39fd05513eb51b7982686794222e6db9edd794362a6fd230593ce1a1c60a6fd623309adb1cae242

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5s:Rh+ZkldDPK8YaKjs

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      2cc5e8580b5dc52a924dd88068acd5f01024981dcb7a6ef335714565687bff1dN

    • Size

      952KB

    • MD5

      a45fccf899ae83c39e790220ac813fd0

    • SHA1

      232e90bfb8ba82a64b7144d4f4d7f5f45d254b20

    • SHA256

      2cc5e8580b5dc52a924dd88068acd5f01024981dcb7a6ef335714565687bff1d

    • SHA512

      58696b944352e5bf59d82978bf421e7adefedf52065bf0e7d39fd05513eb51b7982686794222e6db9edd794362a6fd230593ce1a1c60a6fd623309adb1cae242

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5s:Rh+ZkldDPK8YaKjs

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks