General

  • Target

    6c6c0bca1b5f067323b962b8187a286ab4ee5cf2719cbca49cc964297d495424

  • Size

    902KB

  • Sample

    240309-2wdy5sdb69

  • MD5

    87bf40e3b18274797ad84f543e78eefe

  • SHA1

    0951f02d2b61c01d56313add8c453e57f836e2da

  • SHA256

    6c6c0bca1b5f067323b962b8187a286ab4ee5cf2719cbca49cc964297d495424

  • SHA512

    368784ffc9ca71b0147474f5c9637747d71e4d56b5815c8b0d3abc7e4df535d88c6f433c4b82b6a84fe9c068fe3a736fc5e30df5281c253a213b9c6e6846e26d

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5N:gh+ZkldoPK8YaKGN

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      6c6c0bca1b5f067323b962b8187a286ab4ee5cf2719cbca49cc964297d495424

    • Size

      902KB

    • MD5

      87bf40e3b18274797ad84f543e78eefe

    • SHA1

      0951f02d2b61c01d56313add8c453e57f836e2da

    • SHA256

      6c6c0bca1b5f067323b962b8187a286ab4ee5cf2719cbca49cc964297d495424

    • SHA512

      368784ffc9ca71b0147474f5c9637747d71e4d56b5815c8b0d3abc7e4df535d88c6f433c4b82b6a84fe9c068fe3a736fc5e30df5281c253a213b9c6e6846e26d

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5N:gh+ZkldoPK8YaKGN

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks