General

  • Target

    4251d7e26e0ccd808fe2e89588fb03e18ae2fd5d7714ee542ced7e5f5daed9cc

  • Size

    903KB

  • Sample

    240321-x29wjsfh93

  • MD5

    13536b785d01b20959b0afd7b9ad93ea

  • SHA1

    2eb232c3c5f4517e794e8a841359a5a1a79a9f36

  • SHA256

    4251d7e26e0ccd808fe2e89588fb03e18ae2fd5d7714ee542ced7e5f5daed9cc

  • SHA512

    066f2ab36746740f530b9b5d058f8a98eaf82c7c60a6b426f1d143b21ffc0bda32b1605df53fe2e55c84186d3cc2c99dbce727b1e963ce8327c6c360a4d8fd1e

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5V:gh+ZkldoPK8YaKGV

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      4251d7e26e0ccd808fe2e89588fb03e18ae2fd5d7714ee542ced7e5f5daed9cc

    • Size

      903KB

    • MD5

      13536b785d01b20959b0afd7b9ad93ea

    • SHA1

      2eb232c3c5f4517e794e8a841359a5a1a79a9f36

    • SHA256

      4251d7e26e0ccd808fe2e89588fb03e18ae2fd5d7714ee542ced7e5f5daed9cc

    • SHA512

      066f2ab36746740f530b9b5d058f8a98eaf82c7c60a6b426f1d143b21ffc0bda32b1605df53fe2e55c84186d3cc2c99dbce727b1e963ce8327c6c360a4d8fd1e

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5V:gh+ZkldoPK8YaKGV

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks