General

  • Target

    bb33879f0fbf5818984ecbe7d091262f991ed95e2cef4536832869a11fa2a2f9

  • Size

    904KB

  • Sample

    240709-ew1ftayald

  • MD5

    524275f6f1e724dea6e76d12ca131d09

  • SHA1

    370fbfc0db5d5c85574d9435dbb8dd6e875ec41d

  • SHA256

    bb33879f0fbf5818984ecbe7d091262f991ed95e2cef4536832869a11fa2a2f9

  • SHA512

    3b27a59d1f5404ac5af2173b9edf9023db46ecdb3299cf5690ae765f08d87008779827defacf9ce575a8b02c4089982c2c8c8926f6099916d58b751d8a1bfcf9

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5G:gh+ZkldoPK8YaKGG

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      bb33879f0fbf5818984ecbe7d091262f991ed95e2cef4536832869a11fa2a2f9

    • Size

      904KB

    • MD5

      524275f6f1e724dea6e76d12ca131d09

    • SHA1

      370fbfc0db5d5c85574d9435dbb8dd6e875ec41d

    • SHA256

      bb33879f0fbf5818984ecbe7d091262f991ed95e2cef4536832869a11fa2a2f9

    • SHA512

      3b27a59d1f5404ac5af2173b9edf9023db46ecdb3299cf5690ae765f08d87008779827defacf9ce575a8b02c4089982c2c8c8926f6099916d58b751d8a1bfcf9

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5G:gh+ZkldoPK8YaKGG

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks