General

  • Target

    4554e81b76b2025cf8f0ed2bfe5f95b7deafb9142230561f3d4c09e52fc7c0eb

  • Size

    903KB

  • Sample

    240630-zsnytsvglf

  • MD5

    4143d04f7d652b2b86c7e1649aa23577

  • SHA1

    312705d8350e0f902950cdf080b2685ae75cc4b7

  • SHA256

    4554e81b76b2025cf8f0ed2bfe5f95b7deafb9142230561f3d4c09e52fc7c0eb

  • SHA512

    7e8fc6b0d31faba08c343c7847351c1f9d931f67b3f2bcf008686336248146131419e4185645b8a3ffe76f4ced9a9cf4ae6849aaf01ce72ea06b34c585a13940

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa52:gh+ZkldoPK8YaKG2

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      4554e81b76b2025cf8f0ed2bfe5f95b7deafb9142230561f3d4c09e52fc7c0eb

    • Size

      903KB

    • MD5

      4143d04f7d652b2b86c7e1649aa23577

    • SHA1

      312705d8350e0f902950cdf080b2685ae75cc4b7

    • SHA256

      4554e81b76b2025cf8f0ed2bfe5f95b7deafb9142230561f3d4c09e52fc7c0eb

    • SHA512

      7e8fc6b0d31faba08c343c7847351c1f9d931f67b3f2bcf008686336248146131419e4185645b8a3ffe76f4ced9a9cf4ae6849aaf01ce72ea06b34c585a13940

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa52:gh+ZkldoPK8YaKG2

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks