General

  • Target

    9e902abfc25003a7f3269d36ba77657bc8db6efd9c3b48af7a36027f6ffe61ef

  • Size

    902KB

  • Sample

    240406-a5secagc88

  • MD5

    72783d9d5bf11c9d5475195baecd6374

  • SHA1

    46c20df22125f8a58685fe5692efafe67796804d

  • SHA256

    9e902abfc25003a7f3269d36ba77657bc8db6efd9c3b48af7a36027f6ffe61ef

  • SHA512

    c1615478ac207dad796fb4a9910030cb2a40dd887fa3c83a732be9e43cf6f3ddab7755ca4f930f44237717f9e567e5eebc424387c20ab907b30b236fb8868290

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5o:gh+ZkldoPK8YaKGo

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      9e902abfc25003a7f3269d36ba77657bc8db6efd9c3b48af7a36027f6ffe61ef

    • Size

      902KB

    • MD5

      72783d9d5bf11c9d5475195baecd6374

    • SHA1

      46c20df22125f8a58685fe5692efafe67796804d

    • SHA256

      9e902abfc25003a7f3269d36ba77657bc8db6efd9c3b48af7a36027f6ffe61ef

    • SHA512

      c1615478ac207dad796fb4a9910030cb2a40dd887fa3c83a732be9e43cf6f3ddab7755ca4f930f44237717f9e567e5eebc424387c20ab907b30b236fb8868290

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5o:gh+ZkldoPK8YaKGo

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks