General

  • Target

    7fa8a0380aaf6a20f07cd0ef4f660be1615a8cf18dd9d26b692810e297582fb9N

  • Size

    952KB

  • Sample

    241003-128v2asglh

  • MD5

    1330d4de953c3b8da1f049852ad2ced0

  • SHA1

    4b21f21de2b775b6091b59bf2645913d9d56f544

  • SHA256

    7fa8a0380aaf6a20f07cd0ef4f660be1615a8cf18dd9d26b692810e297582fb9

  • SHA512

    c5eb4a88817c38104771708fe10be879687e2bcb123b002bbfe542558b027436b274b1918f79f31f55f56e1a826c928109eff81c9eca0f6868e1962c0361744f

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5m:Rh+ZkldDPK8YaKjm

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      7fa8a0380aaf6a20f07cd0ef4f660be1615a8cf18dd9d26b692810e297582fb9N

    • Size

      952KB

    • MD5

      1330d4de953c3b8da1f049852ad2ced0

    • SHA1

      4b21f21de2b775b6091b59bf2645913d9d56f544

    • SHA256

      7fa8a0380aaf6a20f07cd0ef4f660be1615a8cf18dd9d26b692810e297582fb9

    • SHA512

      c5eb4a88817c38104771708fe10be879687e2bcb123b002bbfe542558b027436b274b1918f79f31f55f56e1a826c928109eff81c9eca0f6868e1962c0361744f

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5m:Rh+ZkldDPK8YaKjm

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks