General

  • Target

    6e332a14749cd96f8f3e087b6586559d1b7a5fd2ffe946c3a8a3e6247036eb46N

  • Size

    952KB

  • Sample

    241006-2vq73svbkg

  • MD5

    593b09662b8b7d1c9df61a64bdae4e30

  • SHA1

    762ac0f03b4fe44cd87e24f49dcd5e07ad5d9e56

  • SHA256

    6e332a14749cd96f8f3e087b6586559d1b7a5fd2ffe946c3a8a3e6247036eb46

  • SHA512

    ff61b1e962d27a39867decbd9c566a5c47128de819725f2e67d9d132c305c461384ee94b2bac9a3ced6b55dfeefcf9712daf619c9b4bdf377bd834c6be528d2f

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5k:Rh+ZkldDPK8YaKjk

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      6e332a14749cd96f8f3e087b6586559d1b7a5fd2ffe946c3a8a3e6247036eb46N

    • Size

      952KB

    • MD5

      593b09662b8b7d1c9df61a64bdae4e30

    • SHA1

      762ac0f03b4fe44cd87e24f49dcd5e07ad5d9e56

    • SHA256

      6e332a14749cd96f8f3e087b6586559d1b7a5fd2ffe946c3a8a3e6247036eb46

    • SHA512

      ff61b1e962d27a39867decbd9c566a5c47128de819725f2e67d9d132c305c461384ee94b2bac9a3ced6b55dfeefcf9712daf619c9b4bdf377bd834c6be528d2f

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5k:Rh+ZkldDPK8YaKjk

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks