General

  • Target

    3991f0450f742a36e0d07883e316d9682045d2f06327fc624e8e73b506145cae

  • Size

    903KB

  • Sample

    240630-zba1msxhpl

  • MD5

    077a07bdd5d1e17878f49d3329dc3668

  • SHA1

    e6baa56a234260ac128f3c41127f69bfc5832928

  • SHA256

    3991f0450f742a36e0d07883e316d9682045d2f06327fc624e8e73b506145cae

  • SHA512

    0cc3429c7726d9432ded414bb0e8e0364a2b96d3ad141a9b587bfc172f4244fb217d93c746d73efc8b33c500440096fee2064e0133010414066b803f44f45238

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5J:gh+ZkldoPK8YaKGJ

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      3991f0450f742a36e0d07883e316d9682045d2f06327fc624e8e73b506145cae

    • Size

      903KB

    • MD5

      077a07bdd5d1e17878f49d3329dc3668

    • SHA1

      e6baa56a234260ac128f3c41127f69bfc5832928

    • SHA256

      3991f0450f742a36e0d07883e316d9682045d2f06327fc624e8e73b506145cae

    • SHA512

      0cc3429c7726d9432ded414bb0e8e0364a2b96d3ad141a9b587bfc172f4244fb217d93c746d73efc8b33c500440096fee2064e0133010414066b803f44f45238

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5J:gh+ZkldoPK8YaKGJ

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks