General

  • Target

    64ee2030c332d831aae61f412c231054786d0176de31b459979b85cb9333ed05N

  • Size

    952KB

  • Sample

    241007-kslfdazhng

  • MD5

    e2d00de6dd91607ed074108593d41230

  • SHA1

    f78d34dbd52b93b3f74f19643073e88019f6ff81

  • SHA256

    64ee2030c332d831aae61f412c231054786d0176de31b459979b85cb9333ed05

  • SHA512

    563ca877a468a861e617cd51aa71fac37a97f32a2ce6c4f49bcd98bcfa1c1ef6f890fd4d86f8e18032bdfde9672bf4f79fd25e4e179a36c9a7629eaf4536b0fd

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT50:Rh+ZkldDPK8YaKj0

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      64ee2030c332d831aae61f412c231054786d0176de31b459979b85cb9333ed05N

    • Size

      952KB

    • MD5

      e2d00de6dd91607ed074108593d41230

    • SHA1

      f78d34dbd52b93b3f74f19643073e88019f6ff81

    • SHA256

      64ee2030c332d831aae61f412c231054786d0176de31b459979b85cb9333ed05

    • SHA512

      563ca877a468a861e617cd51aa71fac37a97f32a2ce6c4f49bcd98bcfa1c1ef6f890fd4d86f8e18032bdfde9672bf4f79fd25e4e179a36c9a7629eaf4536b0fd

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT50:Rh+ZkldDPK8YaKj0

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks