General

  • Target

    d0b2d90344c9bdd7588a1dee553717cf8f5f9f2ff9203e20e0f8f05687c8a967.exe

  • Size

    952KB

  • Sample

    241205-m5b4ksxmhp

  • MD5

    94129adab03ae7bb9b53518c75fabb83

  • SHA1

    95109aa3e473c4b4ec167bbf71412ee478c972c3

  • SHA256

    d0b2d90344c9bdd7588a1dee553717cf8f5f9f2ff9203e20e0f8f05687c8a967

  • SHA512

    cf92ef7f6d2b12f9d5a94a0e364ad9cfd067bf180fc4a60c66466f2d4b1dcdd4852533b614257b8b88cb51bc45f538ec4261e72eb51eb91ca41b4a9524606173

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5g:Rh+ZkldDPK8YaKjg

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      d0b2d90344c9bdd7588a1dee553717cf8f5f9f2ff9203e20e0f8f05687c8a967.exe

    • Size

      952KB

    • MD5

      94129adab03ae7bb9b53518c75fabb83

    • SHA1

      95109aa3e473c4b4ec167bbf71412ee478c972c3

    • SHA256

      d0b2d90344c9bdd7588a1dee553717cf8f5f9f2ff9203e20e0f8f05687c8a967

    • SHA512

      cf92ef7f6d2b12f9d5a94a0e364ad9cfd067bf180fc4a60c66466f2d4b1dcdd4852533b614257b8b88cb51bc45f538ec4261e72eb51eb91ca41b4a9524606173

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5g:Rh+ZkldDPK8YaKjg

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks