General

  • Target

    7269054bb602cde0b389cfd6aa40141879ef4ed355f5ba84bde91854c8374e4c

  • Size

    904KB

  • Sample

    240702-2ty7asyblr

  • MD5

    fe546fe7cf48fa759b426d7a6b29a3ba

  • SHA1

    7300435e117b83523a43756808aa9543bdf55b45

  • SHA256

    7269054bb602cde0b389cfd6aa40141879ef4ed355f5ba84bde91854c8374e4c

  • SHA512

    bd907228cda34d1d8975ab3a86adafe6a94aa957ab94fb0c278194a9a57f7e6924ee863e9a4faed6369d530fe7acea0390b197e0c596b4a857c223e90a2dbc49

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa59:gh+ZkldoPK8YaKG9

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      7269054bb602cde0b389cfd6aa40141879ef4ed355f5ba84bde91854c8374e4c

    • Size

      904KB

    • MD5

      fe546fe7cf48fa759b426d7a6b29a3ba

    • SHA1

      7300435e117b83523a43756808aa9543bdf55b45

    • SHA256

      7269054bb602cde0b389cfd6aa40141879ef4ed355f5ba84bde91854c8374e4c

    • SHA512

      bd907228cda34d1d8975ab3a86adafe6a94aa957ab94fb0c278194a9a57f7e6924ee863e9a4faed6369d530fe7acea0390b197e0c596b4a857c223e90a2dbc49

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa59:gh+ZkldoPK8YaKG9

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks