General

  • Target

    be4a7caac0283be8f87daa1c7a7d829652ba815a27d7219b0c7264c37157a54d

  • Size

    903KB

  • Sample

    240402-csry6adh6z

  • MD5

    b96eb16dc1689bf867187f4da06198fa

  • SHA1

    c66c041722247e4117644638e2e9822c32ed724b

  • SHA256

    be4a7caac0283be8f87daa1c7a7d829652ba815a27d7219b0c7264c37157a54d

  • SHA512

    71ac31d02a81eb7ee36bb53d4ee994d53fe07e9d35e7046925a36b3ff65f4890a5c7b25ce54e17265811262d06677e36dadd60c6bbf9d73dd12edf67590ee1f3

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5Z:gh+ZkldoPK8YaKGZ

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      be4a7caac0283be8f87daa1c7a7d829652ba815a27d7219b0c7264c37157a54d

    • Size

      903KB

    • MD5

      b96eb16dc1689bf867187f4da06198fa

    • SHA1

      c66c041722247e4117644638e2e9822c32ed724b

    • SHA256

      be4a7caac0283be8f87daa1c7a7d829652ba815a27d7219b0c7264c37157a54d

    • SHA512

      71ac31d02a81eb7ee36bb53d4ee994d53fe07e9d35e7046925a36b3ff65f4890a5c7b25ce54e17265811262d06677e36dadd60c6bbf9d73dd12edf67590ee1f3

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5Z:gh+ZkldoPK8YaKGZ

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks