General

  • Target

    f394745026a2f4c7f62207cebce24b4fa4a60327878233a164e87bb7915a0067N

  • Size

    952KB

  • Sample

    241007-l77slatcmd

  • MD5

    a807e6687e4c26725c43ae8bd8ad14c0

  • SHA1

    d5d1f3821cf1e74bf87ad8adc7a599ed8b506b27

  • SHA256

    f394745026a2f4c7f62207cebce24b4fa4a60327878233a164e87bb7915a0067

  • SHA512

    6385a524cba9736cc9a56ade9736eb1b0798ca635a58a3085a80c48edbb002366f56252499656a7a7f13c8d99e239c437c077bff287e3977d9bda72876b4e8e6

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5u:Rh+ZkldDPK8YaKju

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      f394745026a2f4c7f62207cebce24b4fa4a60327878233a164e87bb7915a0067N

    • Size

      952KB

    • MD5

      a807e6687e4c26725c43ae8bd8ad14c0

    • SHA1

      d5d1f3821cf1e74bf87ad8adc7a599ed8b506b27

    • SHA256

      f394745026a2f4c7f62207cebce24b4fa4a60327878233a164e87bb7915a0067

    • SHA512

      6385a524cba9736cc9a56ade9736eb1b0798ca635a58a3085a80c48edbb002366f56252499656a7a7f13c8d99e239c437c077bff287e3977d9bda72876b4e8e6

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5u:Rh+ZkldDPK8YaKju

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks