General

  • Target

    aca34ba77f1401cc9806a090e00a99bc5b72a4d1f6c3f196a0a8c161451f8344

  • Size

    951KB

  • Sample

    240701-bqq4easalg

  • MD5

    2f6000ed910a5fbe181012665c94ba29

  • SHA1

    b3e7dcd3b1ff9377fdeea5f1e8426d19f7a96ce9

  • SHA256

    aca34ba77f1401cc9806a090e00a99bc5b72a4d1f6c3f196a0a8c161451f8344

  • SHA512

    058d41ac9a94a537b2652640a2746b8482b1568365359c1f84fa51ea663e38850ca9af16285e065127e88c1073047909e832ddb7df53d2a6267ae6ac0072be41

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT57:Rh+ZkldDPK8YaKj7

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      aca34ba77f1401cc9806a090e00a99bc5b72a4d1f6c3f196a0a8c161451f8344

    • Size

      951KB

    • MD5

      2f6000ed910a5fbe181012665c94ba29

    • SHA1

      b3e7dcd3b1ff9377fdeea5f1e8426d19f7a96ce9

    • SHA256

      aca34ba77f1401cc9806a090e00a99bc5b72a4d1f6c3f196a0a8c161451f8344

    • SHA512

      058d41ac9a94a537b2652640a2746b8482b1568365359c1f84fa51ea663e38850ca9af16285e065127e88c1073047909e832ddb7df53d2a6267ae6ac0072be41

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT57:Rh+ZkldDPK8YaKj7

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks