General

  • Target

    699d4f2505d835ddb1c511d0d6e08ec56a303ed462a18066ff738f37dd523114

  • Size

    903KB

  • Sample

    240701-2p3nxsvbnh

  • MD5

    fcf5a6c3ff699413aebf4423953a613e

  • SHA1

    583d67ae322f9a6fd05e2f44a4be84056e51fa10

  • SHA256

    699d4f2505d835ddb1c511d0d6e08ec56a303ed462a18066ff738f37dd523114

  • SHA512

    203d4cbf3aaf078ac6d740cc57e77fc66b5b007d9b6889d55124db0cfae45131c6d372984ce58d46c354204d3cd029c8275adcf511d913467668d34b7f0c60f5

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa57:gh+ZkldoPK8YaKG7

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      699d4f2505d835ddb1c511d0d6e08ec56a303ed462a18066ff738f37dd523114

    • Size

      903KB

    • MD5

      fcf5a6c3ff699413aebf4423953a613e

    • SHA1

      583d67ae322f9a6fd05e2f44a4be84056e51fa10

    • SHA256

      699d4f2505d835ddb1c511d0d6e08ec56a303ed462a18066ff738f37dd523114

    • SHA512

      203d4cbf3aaf078ac6d740cc57e77fc66b5b007d9b6889d55124db0cfae45131c6d372984ce58d46c354204d3cd029c8275adcf511d913467668d34b7f0c60f5

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa57:gh+ZkldoPK8YaKG7

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks