Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 21:58

General

  • Target

    62d1ec6d3fbadbcb5f35185022f02c5c6b49ca833ee078bdaed8cca495ea0590.exe

  • Size

    902KB

  • MD5

    fc682c9c5466e9c19742e131d7296890

  • SHA1

    40ce641c340c08c4f806778cfb7d9edfdb04e850

  • SHA256

    62d1ec6d3fbadbcb5f35185022f02c5c6b49ca833ee078bdaed8cca495ea0590

  • SHA512

    cbd104315b86517edaedd9e999ecc11f174d12aae1b7810a61f0ef261700d42e2307550392afa2ad955342eed7809b6ed6fb8b631c985870cdecb3c76b23eb08

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5l:gh+ZkldoPK8YaKGl

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62d1ec6d3fbadbcb5f35185022f02c5c6b49ca833ee078bdaed8cca495ea0590.exe
    "C:\Users\Admin\AppData\Local\Temp\62d1ec6d3fbadbcb5f35185022f02c5c6b49ca833ee078bdaed8cca495ea0590.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1648-1-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1648-2-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1648-5-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1648-7-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1648-8-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1648-9-0x0000000074070000-0x000000007461B000-memory.dmp

    Filesize

    5.7MB

  • memory/1648-13-0x0000000074070000-0x000000007461B000-memory.dmp

    Filesize

    5.7MB

  • memory/2176-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB