General

  • Target

    778532bbe64b05a1459abcf7a037b15ee659ae174a3cb08d2c8310f8fa592937

  • Size

    903KB

  • Sample

    240620-3th1rasgjf

  • MD5

    ff9d59ed8397455ff79222068f98f42d

  • SHA1

    f5c1b3e17222dade23e0acb4c33a3f906d7a897d

  • SHA256

    778532bbe64b05a1459abcf7a037b15ee659ae174a3cb08d2c8310f8fa592937

  • SHA512

    1dd436ad3c7325a9277f659f4707ae3a9e7dbb9fa9694b712b6286d563c9eda809c757ed267e05b7356c51202fb6b04652e80d04aedd00befffac2d522718a61

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5u:gh+ZkldoPK8YaKGu

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      778532bbe64b05a1459abcf7a037b15ee659ae174a3cb08d2c8310f8fa592937

    • Size

      903KB

    • MD5

      ff9d59ed8397455ff79222068f98f42d

    • SHA1

      f5c1b3e17222dade23e0acb4c33a3f906d7a897d

    • SHA256

      778532bbe64b05a1459abcf7a037b15ee659ae174a3cb08d2c8310f8fa592937

    • SHA512

      1dd436ad3c7325a9277f659f4707ae3a9e7dbb9fa9694b712b6286d563c9eda809c757ed267e05b7356c51202fb6b04652e80d04aedd00befffac2d522718a61

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5u:gh+ZkldoPK8YaKGu

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks