General

  • Target

    2b2eeb6f7b0f1c34467a18055b93e149c2a3bfc9d652479a115403b0a55e4092

  • Size

    903KB

  • Sample

    240519-yqfzrsfb46

  • MD5

    22808dcd7c9e21c50af8883af3a2ca1b

  • SHA1

    522fa2d7ddd1e289f5352b404f40837d31ec4da7

  • SHA256

    2b2eeb6f7b0f1c34467a18055b93e149c2a3bfc9d652479a115403b0a55e4092

  • SHA512

    28ffe063ca1f54df13db17a49454679074661a4433d70edac51b1111346a75b20373f1c9f88b1170c49ef324b657f52370ab8e4599945ce4a8b89bc0130dfd86

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa58:gh+ZkldoPK8YaKG8

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      2b2eeb6f7b0f1c34467a18055b93e149c2a3bfc9d652479a115403b0a55e4092

    • Size

      903KB

    • MD5

      22808dcd7c9e21c50af8883af3a2ca1b

    • SHA1

      522fa2d7ddd1e289f5352b404f40837d31ec4da7

    • SHA256

      2b2eeb6f7b0f1c34467a18055b93e149c2a3bfc9d652479a115403b0a55e4092

    • SHA512

      28ffe063ca1f54df13db17a49454679074661a4433d70edac51b1111346a75b20373f1c9f88b1170c49ef324b657f52370ab8e4599945ce4a8b89bc0130dfd86

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa58:gh+ZkldoPK8YaKG8

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks