General

  • Target

    71666431ae1c3e3a2be6b222ce607bfd47b484ae14622cf5f1b292b0c592504bN

  • Size

    952KB

  • Sample

    241004-se5wvsvbre

  • MD5

    e80cabd225d24688ffa4a2bf873557a0

  • SHA1

    5a5c58e40be7b8e562cf1d1da439982c681579e8

  • SHA256

    71666431ae1c3e3a2be6b222ce607bfd47b484ae14622cf5f1b292b0c592504b

  • SHA512

    c53b79034a4828f6b276c0d8bb8ee35da3de53d5bcc37bf36479b977ecfecc4d14f278d60d6706e7d617855f0af17dcd4750ed24424b1d6db71e0ac4c43f72c7

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5s:Rh+ZkldDPK8YaKjs

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      71666431ae1c3e3a2be6b222ce607bfd47b484ae14622cf5f1b292b0c592504bN

    • Size

      952KB

    • MD5

      e80cabd225d24688ffa4a2bf873557a0

    • SHA1

      5a5c58e40be7b8e562cf1d1da439982c681579e8

    • SHA256

      71666431ae1c3e3a2be6b222ce607bfd47b484ae14622cf5f1b292b0c592504b

    • SHA512

      c53b79034a4828f6b276c0d8bb8ee35da3de53d5bcc37bf36479b977ecfecc4d14f278d60d6706e7d617855f0af17dcd4750ed24424b1d6db71e0ac4c43f72c7

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5s:Rh+ZkldDPK8YaKjs

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks