General

  • Target

    2b38bcc3e957fb5f147e0b2af08464d0.exe

  • Size

    904KB

  • Sample

    240706-b5c54asbpq

  • MD5

    2b38bcc3e957fb5f147e0b2af08464d0

  • SHA1

    d5bf4853e22140a84581af9e7e0e53172f054dd1

  • SHA256

    28e8981fa025043bea53774db708ea86c1ed12fbd9a6910d2f24dc2916d43f7b

  • SHA512

    89ac116d652170d1073b56c6fce707d612c6c573b03984ad1267ea0853fe0beb3923131a205a956da1005def4e2fec61f7ec8c762ccbe20cbfdd5ca0e5cf6f72

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5n:gh+ZkldoPK8YaKGn

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      2b38bcc3e957fb5f147e0b2af08464d0.exe

    • Size

      904KB

    • MD5

      2b38bcc3e957fb5f147e0b2af08464d0

    • SHA1

      d5bf4853e22140a84581af9e7e0e53172f054dd1

    • SHA256

      28e8981fa025043bea53774db708ea86c1ed12fbd9a6910d2f24dc2916d43f7b

    • SHA512

      89ac116d652170d1073b56c6fce707d612c6c573b03984ad1267ea0853fe0beb3923131a205a956da1005def4e2fec61f7ec8c762ccbe20cbfdd5ca0e5cf6f72

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5n:gh+ZkldoPK8YaKGn

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks