General

  • Target

    4da62d2b2b594820ad441ebdf86f3a493d3996146c3ba0362007cc9f4108ab63

  • Size

    903KB

  • Sample

    240629-zytfhawekc

  • MD5

    66d377e201ab016f7a8f13012bf36ab9

  • SHA1

    ceeafcbc325b0600d658560eff94f5f7f6dc8ddc

  • SHA256

    4da62d2b2b594820ad441ebdf86f3a493d3996146c3ba0362007cc9f4108ab63

  • SHA512

    94a03fad59d9d4f1a60f62c23ed5f64fd8ed495e04c82b38041c5d95210a8824d5ce06284577746b3d310bf2acc4d2fc4681c44f3a43419e0e7c422b0e529e13

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa58:gh+ZkldoPK8YaKG8

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      4da62d2b2b594820ad441ebdf86f3a493d3996146c3ba0362007cc9f4108ab63

    • Size

      903KB

    • MD5

      66d377e201ab016f7a8f13012bf36ab9

    • SHA1

      ceeafcbc325b0600d658560eff94f5f7f6dc8ddc

    • SHA256

      4da62d2b2b594820ad441ebdf86f3a493d3996146c3ba0362007cc9f4108ab63

    • SHA512

      94a03fad59d9d4f1a60f62c23ed5f64fd8ed495e04c82b38041c5d95210a8824d5ce06284577746b3d310bf2acc4d2fc4681c44f3a43419e0e7c422b0e529e13

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa58:gh+ZkldoPK8YaKG8

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks