General

  • Target

    86427f5f26324c17d14227c0545e2501f3f149fbd15485bc56cfb79e42818d27

  • Size

    903KB

  • Sample

    240614-a9xvmascnn

  • MD5

    377fe1fe5fd7f6e709ce937edf17dd82

  • SHA1

    ad473ac8ef4222c9c740f4380997a6e0ed0699fe

  • SHA256

    86427f5f26324c17d14227c0545e2501f3f149fbd15485bc56cfb79e42818d27

  • SHA512

    f2532a54892beeccfa8036a3dee78a0787838063515bbbcb4103f1c5c4c2d02633583acb6121bd4acec1c566dbe3059f4eb6d54d3bb701d1c08016296c39930e

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5R:gh+ZkldoPK8YaKGR

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      86427f5f26324c17d14227c0545e2501f3f149fbd15485bc56cfb79e42818d27

    • Size

      903KB

    • MD5

      377fe1fe5fd7f6e709ce937edf17dd82

    • SHA1

      ad473ac8ef4222c9c740f4380997a6e0ed0699fe

    • SHA256

      86427f5f26324c17d14227c0545e2501f3f149fbd15485bc56cfb79e42818d27

    • SHA512

      f2532a54892beeccfa8036a3dee78a0787838063515bbbcb4103f1c5c4c2d02633583acb6121bd4acec1c566dbe3059f4eb6d54d3bb701d1c08016296c39930e

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5R:gh+ZkldoPK8YaKGR

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks