General

  • Target

    3ab97af441a8474b7fa04a1ffec80119e0c812787cc48b8c2d70c949b66acf00

  • Size

    903KB

  • Sample

    240521-1c85habb5w

  • MD5

    fc3941893bb0adf16b19b33a7f4c7214

  • SHA1

    e651cf864290dcab6537b05af76c423a578594fd

  • SHA256

    3ab97af441a8474b7fa04a1ffec80119e0c812787cc48b8c2d70c949b66acf00

  • SHA512

    ed7fd31f22a5c8f70be7560ff6bb2e3ac5c11e208f9f67b33711947281c5b2133b027960b5312309591270e24cc29ff06b1723f113cbceed210c0ab3a0191d1e

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5E:gh+ZkldoPK8YaKGE

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      3ab97af441a8474b7fa04a1ffec80119e0c812787cc48b8c2d70c949b66acf00

    • Size

      903KB

    • MD5

      fc3941893bb0adf16b19b33a7f4c7214

    • SHA1

      e651cf864290dcab6537b05af76c423a578594fd

    • SHA256

      3ab97af441a8474b7fa04a1ffec80119e0c812787cc48b8c2d70c949b66acf00

    • SHA512

      ed7fd31f22a5c8f70be7560ff6bb2e3ac5c11e208f9f67b33711947281c5b2133b027960b5312309591270e24cc29ff06b1723f113cbceed210c0ab3a0191d1e

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5E:gh+ZkldoPK8YaKGE

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks