General

  • Target

    2cfa7f5175bca789dd54e83056bf412cb8b2d620011043d3f6fd8f83321464daN

  • Size

    952KB

  • Sample

    241004-qwdslawhnp

  • MD5

    9e194ab9fc1950dec20e78d5c3f4edf0

  • SHA1

    4340ff3946b23d751c344ccb3264ec4520cc51cb

  • SHA256

    2cfa7f5175bca789dd54e83056bf412cb8b2d620011043d3f6fd8f83321464da

  • SHA512

    9de49dea1257bc7d770927ac541dec9bacc3027cb4a35902f9c50135cfda59a8151801abc8ff4ad67d4fbd9e769ad15906e5eec77f246ba0ff392349478aa8b8

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5Q:Rh+ZkldDPK8YaKjQ

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      2cfa7f5175bca789dd54e83056bf412cb8b2d620011043d3f6fd8f83321464daN

    • Size

      952KB

    • MD5

      9e194ab9fc1950dec20e78d5c3f4edf0

    • SHA1

      4340ff3946b23d751c344ccb3264ec4520cc51cb

    • SHA256

      2cfa7f5175bca789dd54e83056bf412cb8b2d620011043d3f6fd8f83321464da

    • SHA512

      9de49dea1257bc7d770927ac541dec9bacc3027cb4a35902f9c50135cfda59a8151801abc8ff4ad67d4fbd9e769ad15906e5eec77f246ba0ff392349478aa8b8

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5Q:Rh+ZkldDPK8YaKjQ

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks