General

  • Target

    53ffe41b4484d0b4506a3df5a4594bcb9d1553f0dfd7cdfccca99099fd9b02b4

  • Size

    904KB

  • Sample

    240708-2pbkfavgjc

  • MD5

    b4a974d25db98bf5d8cce5799d341cdf

  • SHA1

    911df3e170539514c1100de6649ca30db73e6660

  • SHA256

    53ffe41b4484d0b4506a3df5a4594bcb9d1553f0dfd7cdfccca99099fd9b02b4

  • SHA512

    4a16ec14e29f861c47b7b9c380dc7c1a1d82f520e265f1508d9dcee540f9606bafcbd8feddfc04be81189700ac89ba77fb4ebfaa26d67cff30c5bb75937aac7d

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa52:gh+ZkldoPK8YaKG2

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      53ffe41b4484d0b4506a3df5a4594bcb9d1553f0dfd7cdfccca99099fd9b02b4

    • Size

      904KB

    • MD5

      b4a974d25db98bf5d8cce5799d341cdf

    • SHA1

      911df3e170539514c1100de6649ca30db73e6660

    • SHA256

      53ffe41b4484d0b4506a3df5a4594bcb9d1553f0dfd7cdfccca99099fd9b02b4

    • SHA512

      4a16ec14e29f861c47b7b9c380dc7c1a1d82f520e265f1508d9dcee540f9606bafcbd8feddfc04be81189700ac89ba77fb4ebfaa26d67cff30c5bb75937aac7d

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa52:gh+ZkldoPK8YaKG2

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks