General

  • Target

    e8c4a3900f863590f7a4ff2b67da1db0.exe

  • Size

    901KB

  • Sample

    231126-w6wztaba34

  • MD5

    e8c4a3900f863590f7a4ff2b67da1db0

  • SHA1

    8faca9ab8f15a1cdb9f8a40d0dc01a7b0dd08366

  • SHA256

    182985bf5b005cf4281d6b649434c3294472e872396f3bbe5c7f6f3ce975d22a

  • SHA512

    f3669bda2c472dcb84372d2905da408437a534df3d7e80663da30b700f0fe59a5ce792e4ddf6b1628973fe14f95ea45b7308cdcd9abb8bc94b43c428e6b4f27f

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5i:gh+ZkldoPK8YaKGi

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      e8c4a3900f863590f7a4ff2b67da1db0.exe

    • Size

      901KB

    • MD5

      e8c4a3900f863590f7a4ff2b67da1db0

    • SHA1

      8faca9ab8f15a1cdb9f8a40d0dc01a7b0dd08366

    • SHA256

      182985bf5b005cf4281d6b649434c3294472e872396f3bbe5c7f6f3ce975d22a

    • SHA512

      f3669bda2c472dcb84372d2905da408437a534df3d7e80663da30b700f0fe59a5ce792e4ddf6b1628973fe14f95ea45b7308cdcd9abb8bc94b43c428e6b4f27f

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5i:gh+ZkldoPK8YaKGi

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks