General

  • Target

    2a83e7110d67f9626e651a1afca8c1872b201e0c7c7ac6b46bf6f7b0eb214264

  • Size

    951KB

  • Sample

    240619-yqsnkatdrr

  • MD5

    58ab1e950282e813c97333984750321d

  • SHA1

    fe0ce94463ea8ad3decbd21e59be9cd58a3ae5e5

  • SHA256

    2a83e7110d67f9626e651a1afca8c1872b201e0c7c7ac6b46bf6f7b0eb214264

  • SHA512

    1fb039d45dff6ea931425f1110176c658023944522841edb23317240d042082f04deb40641c3c5b4cfe8ada4188cf784fbb843ead9bd7dd86463d10d034c5af7

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5x:Rh+ZkldDPK8YaKjx

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      2a83e7110d67f9626e651a1afca8c1872b201e0c7c7ac6b46bf6f7b0eb214264

    • Size

      951KB

    • MD5

      58ab1e950282e813c97333984750321d

    • SHA1

      fe0ce94463ea8ad3decbd21e59be9cd58a3ae5e5

    • SHA256

      2a83e7110d67f9626e651a1afca8c1872b201e0c7c7ac6b46bf6f7b0eb214264

    • SHA512

      1fb039d45dff6ea931425f1110176c658023944522841edb23317240d042082f04deb40641c3c5b4cfe8ada4188cf784fbb843ead9bd7dd86463d10d034c5af7

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5x:Rh+ZkldDPK8YaKjx

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks