General

  • Target

    e8a219ccbbb2862024cc4844902fd0a2d38c3a80d26e44aba1b1260a3f24fffd

  • Size

    903KB

  • Sample

    240621-fh2mdsycrf

  • MD5

    b9490ffec5268087b5f7490557e48106

  • SHA1

    b5410c4aa1497221dfd7707f96318df30fb08597

  • SHA256

    e8a219ccbbb2862024cc4844902fd0a2d38c3a80d26e44aba1b1260a3f24fffd

  • SHA512

    226d5fb057ddbdd371002b2bb947b74f731f796b846858c1804c1fa9e6ba23a9da77ce41a342cfc129eb8bf3afb3b459b64e09a0c12932e4289755200f2705b8

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5y:gh+ZkldoPK8YaKGy

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      e8a219ccbbb2862024cc4844902fd0a2d38c3a80d26e44aba1b1260a3f24fffd

    • Size

      903KB

    • MD5

      b9490ffec5268087b5f7490557e48106

    • SHA1

      b5410c4aa1497221dfd7707f96318df30fb08597

    • SHA256

      e8a219ccbbb2862024cc4844902fd0a2d38c3a80d26e44aba1b1260a3f24fffd

    • SHA512

      226d5fb057ddbdd371002b2bb947b74f731f796b846858c1804c1fa9e6ba23a9da77ce41a342cfc129eb8bf3afb3b459b64e09a0c12932e4289755200f2705b8

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5y:gh+ZkldoPK8YaKGy

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks