General

  • Target

    98b5d6e6cc2ecab8d27b375a68b005d8d36412f7528f6c333dbe064e7b5b86a4

  • Size

    903KB

  • Sample

    240614-b3vx5azgmc

  • MD5

    0730ddf0dfe61bd39f4abf1c2abc476f

  • SHA1

    c6b9789a0365e1c90944ee3deb9e5dbc12c63427

  • SHA256

    98b5d6e6cc2ecab8d27b375a68b005d8d36412f7528f6c333dbe064e7b5b86a4

  • SHA512

    4a0378f2c409f906b8fef54d84b18ddb95c6d40ab50479a8ff29f2f8bf5c42d6c132d341c81db5e2d148930c4572648d4dae5979fc894d2519bd0c7a143c0df4

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5n:gh+ZkldoPK8YaKGn

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      98b5d6e6cc2ecab8d27b375a68b005d8d36412f7528f6c333dbe064e7b5b86a4

    • Size

      903KB

    • MD5

      0730ddf0dfe61bd39f4abf1c2abc476f

    • SHA1

      c6b9789a0365e1c90944ee3deb9e5dbc12c63427

    • SHA256

      98b5d6e6cc2ecab8d27b375a68b005d8d36412f7528f6c333dbe064e7b5b86a4

    • SHA512

      4a0378f2c409f906b8fef54d84b18ddb95c6d40ab50479a8ff29f2f8bf5c42d6c132d341c81db5e2d148930c4572648d4dae5979fc894d2519bd0c7a143c0df4

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5n:gh+ZkldoPK8YaKGn

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks