General

  • Target

    19eee7f22cbe01eb2f1b95fe60ccb4f1ecf438ac370e9e30b99632a2b7ac75c7

  • Size

    904KB

  • Sample

    240630-xxs28swenm

  • MD5

    33a9d89964c2907c1396c060b8625da4

  • SHA1

    206b3320956596593788a0fc18fed11e86125e55

  • SHA256

    19eee7f22cbe01eb2f1b95fe60ccb4f1ecf438ac370e9e30b99632a2b7ac75c7

  • SHA512

    1f58229cab13bab408a8103155ea0455ab39a366eef4f486ee2b689b1753796fdfa3de9b36abc2e6f4997f04fc5b54c63f42ce8f609f85621d23e04b145677b8

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa56:gh+ZkldoPK8YaKG6

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      19eee7f22cbe01eb2f1b95fe60ccb4f1ecf438ac370e9e30b99632a2b7ac75c7

    • Size

      904KB

    • MD5

      33a9d89964c2907c1396c060b8625da4

    • SHA1

      206b3320956596593788a0fc18fed11e86125e55

    • SHA256

      19eee7f22cbe01eb2f1b95fe60ccb4f1ecf438ac370e9e30b99632a2b7ac75c7

    • SHA512

      1f58229cab13bab408a8103155ea0455ab39a366eef4f486ee2b689b1753796fdfa3de9b36abc2e6f4997f04fc5b54c63f42ce8f609f85621d23e04b145677b8

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa56:gh+ZkldoPK8YaKG6

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks