General

  • Target

    6f3ac879d6d1e468a4751ede3d78d6adb3e3c1e413bb1b89e2d11b7ad9ccfdab

  • Size

    903KB

  • Sample

    240702-2nmw3stdra

  • MD5

    c54d6a3bfb5b445a729822e180879f79

  • SHA1

    0f3771c4716f136eefdeadae73db9505d79368a0

  • SHA256

    6f3ac879d6d1e468a4751ede3d78d6adb3e3c1e413bb1b89e2d11b7ad9ccfdab

  • SHA512

    e690cdbb08f6aee51e1c55111932f3e326802a530ad136396a742afa1bb66ca3c07e5cdf1b118485da12fca7376da862c42110eb729066e3ae8e995eb9e418c0

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa51:gh+ZkldoPK8YaKG1

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      6f3ac879d6d1e468a4751ede3d78d6adb3e3c1e413bb1b89e2d11b7ad9ccfdab

    • Size

      903KB

    • MD5

      c54d6a3bfb5b445a729822e180879f79

    • SHA1

      0f3771c4716f136eefdeadae73db9505d79368a0

    • SHA256

      6f3ac879d6d1e468a4751ede3d78d6adb3e3c1e413bb1b89e2d11b7ad9ccfdab

    • SHA512

      e690cdbb08f6aee51e1c55111932f3e326802a530ad136396a742afa1bb66ca3c07e5cdf1b118485da12fca7376da862c42110eb729066e3ae8e995eb9e418c0

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa51:gh+ZkldoPK8YaKG1

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks