General

  • Target

    3de9d6a4366870315f5af2b6af019a0a809883249b2e8cfe84cfd607df1a0a47

  • Size

    903KB

  • Sample

    240619-znn32a1dnc

  • MD5

    7460bc74dd19960c935064bf23b140d4

  • SHA1

    9370576165c36f7a4b0c9defb22e98f32073132f

  • SHA256

    3de9d6a4366870315f5af2b6af019a0a809883249b2e8cfe84cfd607df1a0a47

  • SHA512

    a5dade28cd19847fe920c5e087b663d08f94ffb5cdb454302f0dc82cb6e6ca58308872b5c730ededb9bd9e5de79a46c88bf6a4b81dbdceec06c3bd2e36cbf633

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5f:gh+ZkldoPK8YaKGf

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      3de9d6a4366870315f5af2b6af019a0a809883249b2e8cfe84cfd607df1a0a47

    • Size

      903KB

    • MD5

      7460bc74dd19960c935064bf23b140d4

    • SHA1

      9370576165c36f7a4b0c9defb22e98f32073132f

    • SHA256

      3de9d6a4366870315f5af2b6af019a0a809883249b2e8cfe84cfd607df1a0a47

    • SHA512

      a5dade28cd19847fe920c5e087b663d08f94ffb5cdb454302f0dc82cb6e6ca58308872b5c730ededb9bd9e5de79a46c88bf6a4b81dbdceec06c3bd2e36cbf633

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5f:gh+ZkldoPK8YaKGf

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks