General

  • Target

    72f6f53b7efbb7384e0972f1fe632579ced765633eee8cb97b48fe609309ffb4

  • Size

    903KB

  • Sample

    240320-ze2yjabe2x

  • MD5

    a8ed391ba2b0bc2b8b0b9d712c5c2084

  • SHA1

    ad5655e4761ce97ccf25ac401ba7cacde1517ee2

  • SHA256

    72f6f53b7efbb7384e0972f1fe632579ced765633eee8cb97b48fe609309ffb4

  • SHA512

    4172fca47f660034c02e6ce72e4bc245c858afc428470e778362cc7f4294a6a94ceb73befeae2316b1a9b66e47080d20fa01a49fc91489d155db611a9b6f2cce

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5g:gh+ZkldoPK8YaKGg

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      72f6f53b7efbb7384e0972f1fe632579ced765633eee8cb97b48fe609309ffb4

    • Size

      903KB

    • MD5

      a8ed391ba2b0bc2b8b0b9d712c5c2084

    • SHA1

      ad5655e4761ce97ccf25ac401ba7cacde1517ee2

    • SHA256

      72f6f53b7efbb7384e0972f1fe632579ced765633eee8cb97b48fe609309ffb4

    • SHA512

      4172fca47f660034c02e6ce72e4bc245c858afc428470e778362cc7f4294a6a94ceb73befeae2316b1a9b66e47080d20fa01a49fc91489d155db611a9b6f2cce

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5g:gh+ZkldoPK8YaKGg

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks