General

  • Target

    f3d45a76af78e4ad4d2a31ff60c80c3ec3fdd0e69316bd467c70c6494869a51f

  • Size

    903KB

  • Sample

    240614-gn1gys1enr

  • MD5

    11857e3077bfc1e47e54d7103433b5fa

  • SHA1

    10dfb956c8b92e17e38a5fab9a9f95b26f89a95b

  • SHA256

    f3d45a76af78e4ad4d2a31ff60c80c3ec3fdd0e69316bd467c70c6494869a51f

  • SHA512

    3d7a85c237e60fdfeacf6fe12a092359ff1900da9820206f02c90f70496739e68e30c5c465a4cab157fcffe7be6966bd20fb9b5a30d4d89d97faf6e18c9eded3

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5P:gh+ZkldoPK8YaKGP

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      f3d45a76af78e4ad4d2a31ff60c80c3ec3fdd0e69316bd467c70c6494869a51f

    • Size

      903KB

    • MD5

      11857e3077bfc1e47e54d7103433b5fa

    • SHA1

      10dfb956c8b92e17e38a5fab9a9f95b26f89a95b

    • SHA256

      f3d45a76af78e4ad4d2a31ff60c80c3ec3fdd0e69316bd467c70c6494869a51f

    • SHA512

      3d7a85c237e60fdfeacf6fe12a092359ff1900da9820206f02c90f70496739e68e30c5c465a4cab157fcffe7be6966bd20fb9b5a30d4d89d97faf6e18c9eded3

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5P:gh+ZkldoPK8YaKGP

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks