General

  • Target

    7b657054bd7846c49b7ccc14ff61221a5264759f86169fb7f1ce1786ec4937a6

  • Size

    951KB

  • Sample

    240628-3drmysyakj

  • MD5

    334876d9ec166294e0633663c20b91bd

  • SHA1

    dad417eade078624e91915209da4a565dcf2f62b

  • SHA256

    7b657054bd7846c49b7ccc14ff61221a5264759f86169fb7f1ce1786ec4937a6

  • SHA512

    e0d9ed238b184cce7b33fc9115e191355403990860d921bc37c55bf0bb5a587ad8ce4391428d6264f199b6e23d54dd07e23ed13e3ffe52e3ffea4aac075c859c

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5J:Rh+ZkldDPK8YaKjJ

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      7b657054bd7846c49b7ccc14ff61221a5264759f86169fb7f1ce1786ec4937a6

    • Size

      951KB

    • MD5

      334876d9ec166294e0633663c20b91bd

    • SHA1

      dad417eade078624e91915209da4a565dcf2f62b

    • SHA256

      7b657054bd7846c49b7ccc14ff61221a5264759f86169fb7f1ce1786ec4937a6

    • SHA512

      e0d9ed238b184cce7b33fc9115e191355403990860d921bc37c55bf0bb5a587ad8ce4391428d6264f199b6e23d54dd07e23ed13e3ffe52e3ffea4aac075c859c

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5J:Rh+ZkldDPK8YaKjJ

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks