General

  • Target

    c74f1f4305492cffa410fc2d4a045ad6d82c5cd9e447e63654e9c86c22ba2794

  • Size

    903KB

  • Sample

    240621-dzpcaaxckh

  • MD5

    45ef7d7658c3833781f2bc86d13d9572

  • SHA1

    739453c56d879a1c338b0707dff5876177cb754b

  • SHA256

    c74f1f4305492cffa410fc2d4a045ad6d82c5cd9e447e63654e9c86c22ba2794

  • SHA512

    fbc1cbe4ead68f9ac8b7d8a94a9fd114081f3b7f59a18742c391857a77fcecfb5f7a5025d2c6b71665e046d16a32284193636c0ad8f98a075a410aa89ca141c3

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa54:gh+ZkldoPK8YaKG4

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      c74f1f4305492cffa410fc2d4a045ad6d82c5cd9e447e63654e9c86c22ba2794

    • Size

      903KB

    • MD5

      45ef7d7658c3833781f2bc86d13d9572

    • SHA1

      739453c56d879a1c338b0707dff5876177cb754b

    • SHA256

      c74f1f4305492cffa410fc2d4a045ad6d82c5cd9e447e63654e9c86c22ba2794

    • SHA512

      fbc1cbe4ead68f9ac8b7d8a94a9fd114081f3b7f59a18742c391857a77fcecfb5f7a5025d2c6b71665e046d16a32284193636c0ad8f98a075a410aa89ca141c3

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa54:gh+ZkldoPK8YaKG4

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks