General

  • Target

    0ecced9d4b3f2b60add7edc084c977376b1ab808dc8a6193e45dac2092c92ed4

  • Size

    903KB

  • Sample

    240522-xag2fscc5t

  • MD5

    f15a1c082b2522f847ab263af8954096

  • SHA1

    1f02a6054b7fc5c30abbcfde70aa608e44132256

  • SHA256

    0ecced9d4b3f2b60add7edc084c977376b1ab808dc8a6193e45dac2092c92ed4

  • SHA512

    baddee14d26b3bfddf548838515796bc77ea43397bc6d2355e2f92792b7234db34c31acc06e4369eb359a9aebe2278c22197d7dc9e6245fbb502cd93678fa7d7

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5S:gh+ZkldoPK8YaKGS

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      0ecced9d4b3f2b60add7edc084c977376b1ab808dc8a6193e45dac2092c92ed4

    • Size

      903KB

    • MD5

      f15a1c082b2522f847ab263af8954096

    • SHA1

      1f02a6054b7fc5c30abbcfde70aa608e44132256

    • SHA256

      0ecced9d4b3f2b60add7edc084c977376b1ab808dc8a6193e45dac2092c92ed4

    • SHA512

      baddee14d26b3bfddf548838515796bc77ea43397bc6d2355e2f92792b7234db34c31acc06e4369eb359a9aebe2278c22197d7dc9e6245fbb502cd93678fa7d7

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5S:gh+ZkldoPK8YaKGS

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks