General

  • Target

    0064aa55eb2e910adc5178e1333b39dd6af90f90a688eba4c1e8e82712d010c5

  • Size

    902KB

  • Sample

    240311-w7je4scf89

  • MD5

    54df23dbe3efec5f3f7bc21d838f0b8e

  • SHA1

    23147d5816e2eedcbe78086dd86eb833c8626fce

  • SHA256

    0064aa55eb2e910adc5178e1333b39dd6af90f90a688eba4c1e8e82712d010c5

  • SHA512

    10e84476cdc3f725785ed88ce0122beafb2e2d21ee6c2d912a6ee25c8757daf8e95eeaef0e436d02c0183d2aa8235e92839c879a00398c8507c66bcfd6673312

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa53:gh+ZkldoPK8YaKG3

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      0064aa55eb2e910adc5178e1333b39dd6af90f90a688eba4c1e8e82712d010c5

    • Size

      902KB

    • MD5

      54df23dbe3efec5f3f7bc21d838f0b8e

    • SHA1

      23147d5816e2eedcbe78086dd86eb833c8626fce

    • SHA256

      0064aa55eb2e910adc5178e1333b39dd6af90f90a688eba4c1e8e82712d010c5

    • SHA512

      10e84476cdc3f725785ed88ce0122beafb2e2d21ee6c2d912a6ee25c8757daf8e95eeaef0e436d02c0183d2aa8235e92839c879a00398c8507c66bcfd6673312

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa53:gh+ZkldoPK8YaKG3

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks