General

  • Target

    cbfd4431f17ab23f2c6cad8868a9c3c9a2fb956be01c4d036181dce929b0d27e

  • Size

    903KB

  • Sample

    240703-dgmezatgnd

  • MD5

    45f21628111b2a0bb5cdf878a6c49f78

  • SHA1

    c7a16d48b48533237efd4d656bd145c88edf8641

  • SHA256

    cbfd4431f17ab23f2c6cad8868a9c3c9a2fb956be01c4d036181dce929b0d27e

  • SHA512

    984f62ec86d4a4b7a60b06295717542f3b9bd48a715a22789705c62d0289a006e5ab1f5b27d437fa214949475560ae9e057085b9d36b0d462699f5ccc5950853

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5/:gh+ZkldoPK8YaKG/

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      cbfd4431f17ab23f2c6cad8868a9c3c9a2fb956be01c4d036181dce929b0d27e

    • Size

      903KB

    • MD5

      45f21628111b2a0bb5cdf878a6c49f78

    • SHA1

      c7a16d48b48533237efd4d656bd145c88edf8641

    • SHA256

      cbfd4431f17ab23f2c6cad8868a9c3c9a2fb956be01c4d036181dce929b0d27e

    • SHA512

      984f62ec86d4a4b7a60b06295717542f3b9bd48a715a22789705c62d0289a006e5ab1f5b27d437fa214949475560ae9e057085b9d36b0d462699f5ccc5950853

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5/:gh+ZkldoPK8YaKG/

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks