General

  • Target

    6c1de6e48404bcbd85789b345e4ef33b49812257e47c7801b7905772feb4e70a

  • Size

    903KB

  • Sample

    240320-y62amsbb4x

  • MD5

    419ff6deb03c54c139ffb5eaad64614a

  • SHA1

    9817fc27a4c71744b16fe261c3930fe8158b84dc

  • SHA256

    6c1de6e48404bcbd85789b345e4ef33b49812257e47c7801b7905772feb4e70a

  • SHA512

    b85b5388b4c9251c3eaf985481ca01131b1bd2043647c63f03f6d50bf9862f8ac29455c18dfddd484bc068deeb63ac9981c98bd38a2bc83013d834e86b2e1ac6

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5r:gh+ZkldoPK8YaKGr

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      6c1de6e48404bcbd85789b345e4ef33b49812257e47c7801b7905772feb4e70a

    • Size

      903KB

    • MD5

      419ff6deb03c54c139ffb5eaad64614a

    • SHA1

      9817fc27a4c71744b16fe261c3930fe8158b84dc

    • SHA256

      6c1de6e48404bcbd85789b345e4ef33b49812257e47c7801b7905772feb4e70a

    • SHA512

      b85b5388b4c9251c3eaf985481ca01131b1bd2043647c63f03f6d50bf9862f8ac29455c18dfddd484bc068deeb63ac9981c98bd38a2bc83013d834e86b2e1ac6

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5r:gh+ZkldoPK8YaKGr

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks