General

  • Target

    27016e574b6bb54c781ddd2d92849590d34782c9aa8f39d96c478a9bb275ff91

  • Size

    903KB

  • Sample

    240618-ycx15avfqe

  • MD5

    8eda7a4fe15e2785c2ec9702a26c9632

  • SHA1

    fdba506503d18209ff59fe830253e6d4e641cb01

  • SHA256

    27016e574b6bb54c781ddd2d92849590d34782c9aa8f39d96c478a9bb275ff91

  • SHA512

    a1da2f5195ba8b7406878dc062cc02bd3a1b0c93942900e9b27323e4bedd2c44d1c3ac1c03633d31756bc54f462d93583f2ffa9877463915fcbac87a1f09410a

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5L:gh+ZkldoPK8YaKGL

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      27016e574b6bb54c781ddd2d92849590d34782c9aa8f39d96c478a9bb275ff91

    • Size

      903KB

    • MD5

      8eda7a4fe15e2785c2ec9702a26c9632

    • SHA1

      fdba506503d18209ff59fe830253e6d4e641cb01

    • SHA256

      27016e574b6bb54c781ddd2d92849590d34782c9aa8f39d96c478a9bb275ff91

    • SHA512

      a1da2f5195ba8b7406878dc062cc02bd3a1b0c93942900e9b27323e4bedd2c44d1c3ac1c03633d31756bc54f462d93583f2ffa9877463915fcbac87a1f09410a

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5L:gh+ZkldoPK8YaKGL

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks