General

  • Target

    a6c15578496d45eb1f9f066f2dbf43e5f0ca09d2319ab60c8a89337981228b41

  • Size

    903KB

  • Sample

    240619-bg8xvsvfjq

  • MD5

    55f051f604ace6d5e274f7e348dd2dd8

  • SHA1

    ad710a55e4da07cc5cc961450d8990e4ff17f87b

  • SHA256

    a6c15578496d45eb1f9f066f2dbf43e5f0ca09d2319ab60c8a89337981228b41

  • SHA512

    d883ec37158b517bb47c61b20c0dbda3890287d639ac380398909b67b05daaec7bc16cf741adb2b8ad0c7ad749a06d46d9d524313e0cc664c52db5374a9edde7

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5p:gh+ZkldoPK8YaKGp

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      a6c15578496d45eb1f9f066f2dbf43e5f0ca09d2319ab60c8a89337981228b41

    • Size

      903KB

    • MD5

      55f051f604ace6d5e274f7e348dd2dd8

    • SHA1

      ad710a55e4da07cc5cc961450d8990e4ff17f87b

    • SHA256

      a6c15578496d45eb1f9f066f2dbf43e5f0ca09d2319ab60c8a89337981228b41

    • SHA512

      d883ec37158b517bb47c61b20c0dbda3890287d639ac380398909b67b05daaec7bc16cf741adb2b8ad0c7ad749a06d46d9d524313e0cc664c52db5374a9edde7

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5p:gh+ZkldoPK8YaKGp

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks