General

  • Target

    1010aa7b5a8d1d479870d041ee7e8954361003e955ac3cc137dd0aa217af12e7.exe

  • Size

    904KB

  • Sample

    240702-1gscjsvdqk

  • MD5

    f4dcc88dd2ffe6653cc1dc0ba5449f30

  • SHA1

    00406eba906bda4b52fa868e387563a7fd4df085

  • SHA256

    1010aa7b5a8d1d479870d041ee7e8954361003e955ac3cc137dd0aa217af12e7

  • SHA512

    a78a6b53466a49f10d6a559b0430c30869931ed83f4ee6716f5c444e6479b5a4f1ecc12291f89d7d21a08e7368d30b90984926aaa575a57b802a8b5a9b167614

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa54:gh+ZkldoPK8YaKG4

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      1010aa7b5a8d1d479870d041ee7e8954361003e955ac3cc137dd0aa217af12e7.exe

    • Size

      904KB

    • MD5

      f4dcc88dd2ffe6653cc1dc0ba5449f30

    • SHA1

      00406eba906bda4b52fa868e387563a7fd4df085

    • SHA256

      1010aa7b5a8d1d479870d041ee7e8954361003e955ac3cc137dd0aa217af12e7

    • SHA512

      a78a6b53466a49f10d6a559b0430c30869931ed83f4ee6716f5c444e6479b5a4f1ecc12291f89d7d21a08e7368d30b90984926aaa575a57b802a8b5a9b167614

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa54:gh+ZkldoPK8YaKG4

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks