General

  • Target

    9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249

  • Size

    903KB

  • Sample

    240709-c2qsfssbmq

  • MD5

    e7b74b2b71ee94341d5226bece5edbb2

  • SHA1

    f4207f742ac78226ff19a97af067c64c134702d6

  • SHA256

    9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249

  • SHA512

    b4e79bcd0838ee9f781e01a998d262e390d446a98a89c16be03a0c1fcdf94a71843d5b5a25b5fe0a908aa3aaa5b12bd8e8aa8b3637a28f45fd5e946f60a4e15c

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5M:gh+ZkldoPK8YaKGM

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249

    • Size

      903KB

    • MD5

      e7b74b2b71ee94341d5226bece5edbb2

    • SHA1

      f4207f742ac78226ff19a97af067c64c134702d6

    • SHA256

      9b8a6009e8c26fd26faa5e3129c0eba1b8ec7287c88fde5001779d83f5e77249

    • SHA512

      b4e79bcd0838ee9f781e01a998d262e390d446a98a89c16be03a0c1fcdf94a71843d5b5a25b5fe0a908aa3aaa5b12bd8e8aa8b3637a28f45fd5e946f60a4e15c

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5M:gh+ZkldoPK8YaKGM

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks