General

  • Target

    2f1ee3e974466f9cfe516ec83f7c517ddeb7862d10d420d30fa824ceed52fc67

  • Size

    903KB

  • Sample

    240523-yq5ywsec6z

  • MD5

    b652d2b2abeb25c3a1bcad7b3379f42e

  • SHA1

    14f0be4a6eb80e9421ca6904a28ae7dd05f53c33

  • SHA256

    2f1ee3e974466f9cfe516ec83f7c517ddeb7862d10d420d30fa824ceed52fc67

  • SHA512

    75ebd83129b2b0a1316d881d3ac076a5e4b9b85b4aebc62e8ac08e5a1463ba7c55c44fa4b57ba5ba67cc98ad32c750b3261b16a650726eaff571c47b4173b4aa

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa55:gh+ZkldoPK8YaKG5

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      2f1ee3e974466f9cfe516ec83f7c517ddeb7862d10d420d30fa824ceed52fc67

    • Size

      903KB

    • MD5

      b652d2b2abeb25c3a1bcad7b3379f42e

    • SHA1

      14f0be4a6eb80e9421ca6904a28ae7dd05f53c33

    • SHA256

      2f1ee3e974466f9cfe516ec83f7c517ddeb7862d10d420d30fa824ceed52fc67

    • SHA512

      75ebd83129b2b0a1316d881d3ac076a5e4b9b85b4aebc62e8ac08e5a1463ba7c55c44fa4b57ba5ba67cc98ad32c750b3261b16a650726eaff571c47b4173b4aa

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa55:gh+ZkldoPK8YaKG5

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks