General

  • Target

    d46a404ba99d19b1df7bd95abaa4f131643d03a0737039b53a051fa1b4d64733

  • Size

    904KB

  • Sample

    240709-gdc9nsycqp

  • MD5

    fe8a08c4cbd53e003b184eca79a5eb4f

  • SHA1

    31800e1562bd1a6569312dbd4b00bdf51ef72ebc

  • SHA256

    d46a404ba99d19b1df7bd95abaa4f131643d03a0737039b53a051fa1b4d64733

  • SHA512

    85c9f1c560a0b7a6fd9cd8161458e84518bf7b9d337ee8a79c2d852a892a3895b59e0ce0850280c61dfd440b7384f8676cc877bed425ff645a2e65f32de73fb3

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5R:gh+ZkldoPK8YaKGR

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      d46a404ba99d19b1df7bd95abaa4f131643d03a0737039b53a051fa1b4d64733

    • Size

      904KB

    • MD5

      fe8a08c4cbd53e003b184eca79a5eb4f

    • SHA1

      31800e1562bd1a6569312dbd4b00bdf51ef72ebc

    • SHA256

      d46a404ba99d19b1df7bd95abaa4f131643d03a0737039b53a051fa1b4d64733

    • SHA512

      85c9f1c560a0b7a6fd9cd8161458e84518bf7b9d337ee8a79c2d852a892a3895b59e0ce0850280c61dfd440b7384f8676cc877bed425ff645a2e65f32de73fb3

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5R:gh+ZkldoPK8YaKGR

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks