General

  • Target

    15eb4eccc949d18653e768ae292ccd80c5a6cbb51a7c9a584099d6366d2cbbaaN

  • Size

    952KB

  • Sample

    241004-st556swbjd

  • MD5

    643e614a804d3c2d2e3b9ec0a48370e0

  • SHA1

    c898713c12ee0085d71361de39043d031bcb008c

  • SHA256

    15eb4eccc949d18653e768ae292ccd80c5a6cbb51a7c9a584099d6366d2cbbaa

  • SHA512

    d7a5905321a7f17de3e8f71de7146cd378a7d7a22fd6a1d64fa243ebb22f4627465c055f0729417796aa15feb94fa71b6cb2b161b241bf99a917a1ec2ffe25c9

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5u:Rh+ZkldDPK8YaKju

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      15eb4eccc949d18653e768ae292ccd80c5a6cbb51a7c9a584099d6366d2cbbaaN

    • Size

      952KB

    • MD5

      643e614a804d3c2d2e3b9ec0a48370e0

    • SHA1

      c898713c12ee0085d71361de39043d031bcb008c

    • SHA256

      15eb4eccc949d18653e768ae292ccd80c5a6cbb51a7c9a584099d6366d2cbbaa

    • SHA512

      d7a5905321a7f17de3e8f71de7146cd378a7d7a22fd6a1d64fa243ebb22f4627465c055f0729417796aa15feb94fa71b6cb2b161b241bf99a917a1ec2ffe25c9

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5u:Rh+ZkldDPK8YaKju

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks