General

  • Target

    74c97957a4e96aebc962aa67e35827b2ac140232183f53767654b70e1b5b691a

  • Size

    903KB

  • Sample

    240623-21vsfszgnm

  • MD5

    5c8d85c0e8af7ad7fa82c1709848ea0f

  • SHA1

    58a0e37f30c6e9ee0b0671313d57eeb515f52dea

  • SHA256

    74c97957a4e96aebc962aa67e35827b2ac140232183f53767654b70e1b5b691a

  • SHA512

    11e7fb62156d3320eb5add80c23cf7a08b626fab08378ad6d3858ad7efeec7f0a4843b85fa30a3b2df114e6d93ca4bb6f344cc602f200a9d5d11d874814196c8

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5j:gh+ZkldoPK8YaKGj

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      74c97957a4e96aebc962aa67e35827b2ac140232183f53767654b70e1b5b691a

    • Size

      903KB

    • MD5

      5c8d85c0e8af7ad7fa82c1709848ea0f

    • SHA1

      58a0e37f30c6e9ee0b0671313d57eeb515f52dea

    • SHA256

      74c97957a4e96aebc962aa67e35827b2ac140232183f53767654b70e1b5b691a

    • SHA512

      11e7fb62156d3320eb5add80c23cf7a08b626fab08378ad6d3858ad7efeec7f0a4843b85fa30a3b2df114e6d93ca4bb6f344cc602f200a9d5d11d874814196c8

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5j:gh+ZkldoPK8YaKGj

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks