General

  • Target

    692d5201be05aedabab8fbfbcba41784c9d5de8c083e8d70dd29d2121eb920bcN

  • Size

    952KB

  • Sample

    241002-x7y18swfqh

  • MD5

    f089b2785548cc4cc98855432a0da7d0

  • SHA1

    838d41175a3c3702c5055ad8ea0867ca7644d660

  • SHA256

    692d5201be05aedabab8fbfbcba41784c9d5de8c083e8d70dd29d2121eb920bc

  • SHA512

    c57f681acc9f6ed1cafb0316fab58a667cc1cc1851946851faf6196f7fd32cca3cf1fceb8f1dd5065f014c1cb2f86020ee7e0ea67c9c51f616d3d65f8d77bea6

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5U:Rh+ZkldDPK8YaKjU

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      692d5201be05aedabab8fbfbcba41784c9d5de8c083e8d70dd29d2121eb920bcN

    • Size

      952KB

    • MD5

      f089b2785548cc4cc98855432a0da7d0

    • SHA1

      838d41175a3c3702c5055ad8ea0867ca7644d660

    • SHA256

      692d5201be05aedabab8fbfbcba41784c9d5de8c083e8d70dd29d2121eb920bc

    • SHA512

      c57f681acc9f6ed1cafb0316fab58a667cc1cc1851946851faf6196f7fd32cca3cf1fceb8f1dd5065f014c1cb2f86020ee7e0ea67c9c51f616d3d65f8d77bea6

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5U:Rh+ZkldDPK8YaKjU

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks