General

  • Target

    83240c5297f75f8b4a49c1c16afde6fa0db4c0f00e3f515ecf13c889eea0b365

  • Size

    903KB

  • Sample

    240626-1w2vjaygmm

  • MD5

    dcfb06761c3f85dfb38a098e7fdb6c19

  • SHA1

    50adaccfb0862ec180a3effd72a5131ebd360490

  • SHA256

    83240c5297f75f8b4a49c1c16afde6fa0db4c0f00e3f515ecf13c889eea0b365

  • SHA512

    b725c65b0f97adc36168c507b21b78ef71902d6e8a15f32104f93a14f2e4fd6a023cb4df5f18c7fff9cf2eb19067adbe495868f72c59acf3c48ee88a38728613

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5X:gh+ZkldoPK8YaKGX

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      83240c5297f75f8b4a49c1c16afde6fa0db4c0f00e3f515ecf13c889eea0b365

    • Size

      903KB

    • MD5

      dcfb06761c3f85dfb38a098e7fdb6c19

    • SHA1

      50adaccfb0862ec180a3effd72a5131ebd360490

    • SHA256

      83240c5297f75f8b4a49c1c16afde6fa0db4c0f00e3f515ecf13c889eea0b365

    • SHA512

      b725c65b0f97adc36168c507b21b78ef71902d6e8a15f32104f93a14f2e4fd6a023cb4df5f18c7fff9cf2eb19067adbe495868f72c59acf3c48ee88a38728613

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5X:gh+ZkldoPK8YaKGX

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks