General

  • Target

    359af99717812c2a3c36881a44b6f2723d9291876c3aae743b26d0efa2a81f04.exe

  • Size

    903KB

  • Sample

    240704-dqzfwstcph

  • MD5

    f15b1c31ce75ca3648597ba5c6cfbbe0

  • SHA1

    dd1e63d226f7079b1ee5af6d8edcc48e03133f0b

  • SHA256

    359af99717812c2a3c36881a44b6f2723d9291876c3aae743b26d0efa2a81f04

  • SHA512

    e79611cbf8885b886ad8a8a5317e545f1f9927b7c719095b4fbe6011da664ee3eb73b99151f761199cb2528557bc10483dc26e86d21e53bff625b77fb0fe5352

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa59:gh+ZkldoPK8YaKG9

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      359af99717812c2a3c36881a44b6f2723d9291876c3aae743b26d0efa2a81f04.exe

    • Size

      903KB

    • MD5

      f15b1c31ce75ca3648597ba5c6cfbbe0

    • SHA1

      dd1e63d226f7079b1ee5af6d8edcc48e03133f0b

    • SHA256

      359af99717812c2a3c36881a44b6f2723d9291876c3aae743b26d0efa2a81f04

    • SHA512

      e79611cbf8885b886ad8a8a5317e545f1f9927b7c719095b4fbe6011da664ee3eb73b99151f761199cb2528557bc10483dc26e86d21e53bff625b77fb0fe5352

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa59:gh+ZkldoPK8YaKG9

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks