General

  • Target

    e031e853924b1969170a2b0a31da417426459a64ae7f65a8397e7322ee16f15e

  • Size

    902KB

  • Sample

    240324-bx4m3sac8w

  • MD5

    923658b676098fa032b1117009513227

  • SHA1

    c676694979bdabc83abd0a6ee04b30901fcbba47

  • SHA256

    e031e853924b1969170a2b0a31da417426459a64ae7f65a8397e7322ee16f15e

  • SHA512

    b4fc63f0d99ac62b3a57315515b704449fa393e28019bfbdc6661f6d37c70d51ce6ea3579d795a2cd1dfc49a1ff0753a0509f697e40f3f333040754277ac668d

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5F:gh+ZkldoPK8YaKGF

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      e031e853924b1969170a2b0a31da417426459a64ae7f65a8397e7322ee16f15e

    • Size

      902KB

    • MD5

      923658b676098fa032b1117009513227

    • SHA1

      c676694979bdabc83abd0a6ee04b30901fcbba47

    • SHA256

      e031e853924b1969170a2b0a31da417426459a64ae7f65a8397e7322ee16f15e

    • SHA512

      b4fc63f0d99ac62b3a57315515b704449fa393e28019bfbdc6661f6d37c70d51ce6ea3579d795a2cd1dfc49a1ff0753a0509f697e40f3f333040754277ac668d

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5F:gh+ZkldoPK8YaKGF

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks