General

  • Target

    86254000674e9b671966cda3712ff84540f68d4ee1b2459aef902b71da4b8b41

  • Size

    902KB

  • Sample

    240316-1pschsda9s

  • MD5

    5aef97332964d22495e2c58395e64199

  • SHA1

    997be8999208bb072cb2b3c6a0473389c48aea66

  • SHA256

    86254000674e9b671966cda3712ff84540f68d4ee1b2459aef902b71da4b8b41

  • SHA512

    b1de0a200cd5b282f4ddb01a524b719040ad23121dfa8d48de97c7549f53e211e5752f739304f0c31871f024af3bd4cee68316e8453c9f48366c22ac8e08b0bb

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5r:gh+ZkldoPK8YaKGr

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      86254000674e9b671966cda3712ff84540f68d4ee1b2459aef902b71da4b8b41

    • Size

      902KB

    • MD5

      5aef97332964d22495e2c58395e64199

    • SHA1

      997be8999208bb072cb2b3c6a0473389c48aea66

    • SHA256

      86254000674e9b671966cda3712ff84540f68d4ee1b2459aef902b71da4b8b41

    • SHA512

      b1de0a200cd5b282f4ddb01a524b719040ad23121dfa8d48de97c7549f53e211e5752f739304f0c31871f024af3bd4cee68316e8453c9f48366c22ac8e08b0bb

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5r:gh+ZkldoPK8YaKGr

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks