General

  • Target

    18e12ecf87db5d58357b9f6b0e3d74fa34d4eab2bc7ec273394495f071e6c9fbN.exe

  • Size

    904KB

  • Sample

    241204-vkac9axlcj

  • MD5

    9946eeb55e52f2c31a4d7400bad924f0

  • SHA1

    83f55d9025cb537fc18ba461e06d50459cddc5b9

  • SHA256

    18e12ecf87db5d58357b9f6b0e3d74fa34d4eab2bc7ec273394495f071e6c9fb

  • SHA512

    e7606a6d8da1b64f70e3685c9ecc4bc5b71357eafb89719435ab24e7c7f70d04479af696b12c24a53c3d7a70df872d62cfb0b9e5a8836f57cf69877706b79111

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5h:gh+ZkldoPK8YaKGh

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      18e12ecf87db5d58357b9f6b0e3d74fa34d4eab2bc7ec273394495f071e6c9fbN.exe

    • Size

      904KB

    • MD5

      9946eeb55e52f2c31a4d7400bad924f0

    • SHA1

      83f55d9025cb537fc18ba461e06d50459cddc5b9

    • SHA256

      18e12ecf87db5d58357b9f6b0e3d74fa34d4eab2bc7ec273394495f071e6c9fb

    • SHA512

      e7606a6d8da1b64f70e3685c9ecc4bc5b71357eafb89719435ab24e7c7f70d04479af696b12c24a53c3d7a70df872d62cfb0b9e5a8836f57cf69877706b79111

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5h:gh+ZkldoPK8YaKGh

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks