General

  • Target

    5a5db220c9d99c280d12e0eed824db002c1f5ae73e5666766a18a4fb69ca89cd

  • Size

    903KB

  • Sample

    240521-2928wsdd26

  • MD5

    01c0c11bffaa488693c73c868f453ea1

  • SHA1

    13678921905afde904f777be5dd045944d1e0deb

  • SHA256

    5a5db220c9d99c280d12e0eed824db002c1f5ae73e5666766a18a4fb69ca89cd

  • SHA512

    a291bb079af2ef3e06c51437e8148da19e82607e195e4d1fb75dc04610dbd441a36b77b5f42adcfa5af411e94ad6dfa70a71087ee9676c36ec0962a95a4aaf90

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5o:gh+ZkldoPK8YaKGo

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      5a5db220c9d99c280d12e0eed824db002c1f5ae73e5666766a18a4fb69ca89cd

    • Size

      903KB

    • MD5

      01c0c11bffaa488693c73c868f453ea1

    • SHA1

      13678921905afde904f777be5dd045944d1e0deb

    • SHA256

      5a5db220c9d99c280d12e0eed824db002c1f5ae73e5666766a18a4fb69ca89cd

    • SHA512

      a291bb079af2ef3e06c51437e8148da19e82607e195e4d1fb75dc04610dbd441a36b77b5f42adcfa5af411e94ad6dfa70a71087ee9676c36ec0962a95a4aaf90

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5o:gh+ZkldoPK8YaKGo

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks