General

  • Target

    e00fd3dd6014bd69245148b0443f1aee51a99abf932d02df3960f0c41dd34f2e

  • Size

    902KB

  • Sample

    240403-c86r9aea53

  • MD5

    2d6adae65589904ef5ec8226fb2aa018

  • SHA1

    931151f1894cf3b9fb8a28113f020cc1aa4742d2

  • SHA256

    e00fd3dd6014bd69245148b0443f1aee51a99abf932d02df3960f0c41dd34f2e

  • SHA512

    e035af4f67f86bb444827af73c9304a105d9b6772c1c8b37fa38c54c05d74cdc00420e07154b9995408bc97dea6104eafe8cadc21d18a2051076ea0adcbc965c

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5r:gh+ZkldoPK8YaKGr

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      e00fd3dd6014bd69245148b0443f1aee51a99abf932d02df3960f0c41dd34f2e

    • Size

      902KB

    • MD5

      2d6adae65589904ef5ec8226fb2aa018

    • SHA1

      931151f1894cf3b9fb8a28113f020cc1aa4742d2

    • SHA256

      e00fd3dd6014bd69245148b0443f1aee51a99abf932d02df3960f0c41dd34f2e

    • SHA512

      e035af4f67f86bb444827af73c9304a105d9b6772c1c8b37fa38c54c05d74cdc00420e07154b9995408bc97dea6104eafe8cadc21d18a2051076ea0adcbc965c

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5r:gh+ZkldoPK8YaKGr

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks