General

  • Target

    d0f3c277b318b47440505beaa8e8e15cc2d48f94f22736193758efba60a1995eN

  • Size

    952KB

  • Sample

    241007-hjmkza1gkl

  • MD5

    826a2ddd75200e6f29ad0e04b47f68e0

  • SHA1

    a5f9b9639efd07e02e518e0e99a5b7db5e006d49

  • SHA256

    d0f3c277b318b47440505beaa8e8e15cc2d48f94f22736193758efba60a1995e

  • SHA512

    0bc4e9bdeeb8544c3c8b948c49a2aa415aa8c9737b5b0b8577e796b02d1566a2ad34de84ee295543823805812813d9d98ff4b02942a8dd89dabb7344730bcf22

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5W:Rh+ZkldDPK8YaKjW

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      d0f3c277b318b47440505beaa8e8e15cc2d48f94f22736193758efba60a1995eN

    • Size

      952KB

    • MD5

      826a2ddd75200e6f29ad0e04b47f68e0

    • SHA1

      a5f9b9639efd07e02e518e0e99a5b7db5e006d49

    • SHA256

      d0f3c277b318b47440505beaa8e8e15cc2d48f94f22736193758efba60a1995e

    • SHA512

      0bc4e9bdeeb8544c3c8b948c49a2aa415aa8c9737b5b0b8577e796b02d1566a2ad34de84ee295543823805812813d9d98ff4b02942a8dd89dabb7344730bcf22

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5W:Rh+ZkldDPK8YaKjW

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks