General

  • Target

    b7194284ee8fe824d546cdfe3c98ad6f5afe38d1bc0c776520c0a116e7d7aa9e

  • Size

    903KB

  • Sample

    240321-3lg4gsfa61

  • MD5

    1ff643fe0514b6fa0a6be879e184f7dc

  • SHA1

    d06b3ac2dffc236886ef2075c92a913be1e3d418

  • SHA256

    b7194284ee8fe824d546cdfe3c98ad6f5afe38d1bc0c776520c0a116e7d7aa9e

  • SHA512

    699b57fb7728345b8546a0ed72da6f9f6a7f748a8e36f180f1afc5f8ac4fb3a3668e2622f5efa0ba9df33a4f3826154d3c18bf81476085197b37b488ffe0f76e

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5q:gh+ZkldoPK8YaKGq

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      b7194284ee8fe824d546cdfe3c98ad6f5afe38d1bc0c776520c0a116e7d7aa9e

    • Size

      903KB

    • MD5

      1ff643fe0514b6fa0a6be879e184f7dc

    • SHA1

      d06b3ac2dffc236886ef2075c92a913be1e3d418

    • SHA256

      b7194284ee8fe824d546cdfe3c98ad6f5afe38d1bc0c776520c0a116e7d7aa9e

    • SHA512

      699b57fb7728345b8546a0ed72da6f9f6a7f748a8e36f180f1afc5f8ac4fb3a3668e2622f5efa0ba9df33a4f3826154d3c18bf81476085197b37b488ffe0f76e

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5q:gh+ZkldoPK8YaKGq

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks