General

  • Target

    681f92a794c2dcfa56bca1eab50cdeb7abd7d0ca571a7b52974f29ad6714fd10N

  • Size

    952KB

  • Sample

    241003-bnbwpsxaln

  • MD5

    c4341e88d851d1718c54146acd9c4990

  • SHA1

    899b13c567124269a1ac0d0952ba880bcd748689

  • SHA256

    681f92a794c2dcfa56bca1eab50cdeb7abd7d0ca571a7b52974f29ad6714fd10

  • SHA512

    3bd4ecba8cc86bcf576d76ad8677734f1a0e853cd7ad3635dc3bebe60a9de66d242bc02d38ff4ae7dbad7047fe5f8feaf958de7cbb150afdd16c3f3168037110

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5i:Rh+ZkldDPK8YaKji

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      681f92a794c2dcfa56bca1eab50cdeb7abd7d0ca571a7b52974f29ad6714fd10N

    • Size

      952KB

    • MD5

      c4341e88d851d1718c54146acd9c4990

    • SHA1

      899b13c567124269a1ac0d0952ba880bcd748689

    • SHA256

      681f92a794c2dcfa56bca1eab50cdeb7abd7d0ca571a7b52974f29ad6714fd10

    • SHA512

      3bd4ecba8cc86bcf576d76ad8677734f1a0e853cd7ad3635dc3bebe60a9de66d242bc02d38ff4ae7dbad7047fe5f8feaf958de7cbb150afdd16c3f3168037110

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5i:Rh+ZkldDPK8YaKji

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks