General

  • Target

    ad0a7dea01f86543beff22c59ed3f660a022ad00f74309879e9da6e240b669ea

  • Size

    903KB

  • Sample

    240525-cf6a1sag5w

  • MD5

    8c07a58a47cd179f6de43c5fe0ea82eb

  • SHA1

    fb7225b10342a88bcbcad13e0b9fa574f54a4e23

  • SHA256

    ad0a7dea01f86543beff22c59ed3f660a022ad00f74309879e9da6e240b669ea

  • SHA512

    e9665b7731cfefda5f7a0631dbcae1aeb766db7842e0c06c8382c994d0db2aaa89928bedbaa6e6a7d8a1cb3d4c4968c23437716a17ed8d10291fd06c5133cab3

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa50:gh+ZkldoPK8YaKG0

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      ad0a7dea01f86543beff22c59ed3f660a022ad00f74309879e9da6e240b669ea

    • Size

      903KB

    • MD5

      8c07a58a47cd179f6de43c5fe0ea82eb

    • SHA1

      fb7225b10342a88bcbcad13e0b9fa574f54a4e23

    • SHA256

      ad0a7dea01f86543beff22c59ed3f660a022ad00f74309879e9da6e240b669ea

    • SHA512

      e9665b7731cfefda5f7a0631dbcae1aeb766db7842e0c06c8382c994d0db2aaa89928bedbaa6e6a7d8a1cb3d4c4968c23437716a17ed8d10291fd06c5133cab3

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa50:gh+ZkldoPK8YaKG0

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks