General

  • Target

    64aa90c5466b8fa063b446f5d57c6c4d5e6a82b04683e7b05b25ef2e04a161e3

  • Size

    903KB

  • Sample

    240524-2h6r1ade5z

  • MD5

    7928bb1c0f4a932bfde31482ba47bc49

  • SHA1

    46b917a53d587d9cbb09358d64f8e486b31f2e02

  • SHA256

    64aa90c5466b8fa063b446f5d57c6c4d5e6a82b04683e7b05b25ef2e04a161e3

  • SHA512

    63db3b97e9f4c827875323fafc03478cdbf11dd04c6303f35c3582a7fb3ffe9d57936cd9c4cea4b56c3f9e5e8b4520135ba6d38a8d3facc4c13f8a31285aed3c

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5U:gh+ZkldoPK8YaKGU

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      64aa90c5466b8fa063b446f5d57c6c4d5e6a82b04683e7b05b25ef2e04a161e3

    • Size

      903KB

    • MD5

      7928bb1c0f4a932bfde31482ba47bc49

    • SHA1

      46b917a53d587d9cbb09358d64f8e486b31f2e02

    • SHA256

      64aa90c5466b8fa063b446f5d57c6c4d5e6a82b04683e7b05b25ef2e04a161e3

    • SHA512

      63db3b97e9f4c827875323fafc03478cdbf11dd04c6303f35c3582a7fb3ffe9d57936cd9c4cea4b56c3f9e5e8b4520135ba6d38a8d3facc4c13f8a31285aed3c

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5U:gh+ZkldoPK8YaKGU

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks