General

  • Target

    bd7d2803b3be46adefcd3e99cc1b4c6779d995363b2e404955a0b43deddd54f5

  • Size

    952KB

  • Sample

    241011-cdcwpavclp

  • MD5

    73f01c36299580e6ee33a70afaddfc83

  • SHA1

    72dae446461ea8c39b4ba7c7c6111af051799948

  • SHA256

    bd7d2803b3be46adefcd3e99cc1b4c6779d995363b2e404955a0b43deddd54f5

  • SHA512

    71d0ac66f84dd680d8f0c40d7da72332ea285ead66e2e9431048a34dc1006c802a1943751efa7615254e56d9a07b66dbbf3bea178087aef3caa8500ee47e500d

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5V:Rh+ZkldDPK8YaKjV

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      bd7d2803b3be46adefcd3e99cc1b4c6779d995363b2e404955a0b43deddd54f5

    • Size

      952KB

    • MD5

      73f01c36299580e6ee33a70afaddfc83

    • SHA1

      72dae446461ea8c39b4ba7c7c6111af051799948

    • SHA256

      bd7d2803b3be46adefcd3e99cc1b4c6779d995363b2e404955a0b43deddd54f5

    • SHA512

      71d0ac66f84dd680d8f0c40d7da72332ea285ead66e2e9431048a34dc1006c802a1943751efa7615254e56d9a07b66dbbf3bea178087aef3caa8500ee47e500d

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5V:Rh+ZkldDPK8YaKjV

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks