General

  • Target

    f0a994ecc851b3456709d4e47191749b8e4c54d0d5f2a638b9972eadc9b200ef

  • Size

    904KB

  • Sample

    240710-hvwm1stcnm

  • MD5

    c66671bbbde4525620e82f1ac1b2830d

  • SHA1

    d67703f1ae2ce0cc67401d589ca758af7909b517

  • SHA256

    f0a994ecc851b3456709d4e47191749b8e4c54d0d5f2a638b9972eadc9b200ef

  • SHA512

    13ecfd3b2384e5a8f31e3f7a493a0cd20a256c40892d44ff6a4f5869989f71923892618fd331eb3f01c97f3225229a08c99af358725c9b166d64f0738e6b8c56

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5y:gh+ZkldoPK8YaKGy

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      f0a994ecc851b3456709d4e47191749b8e4c54d0d5f2a638b9972eadc9b200ef

    • Size

      904KB

    • MD5

      c66671bbbde4525620e82f1ac1b2830d

    • SHA1

      d67703f1ae2ce0cc67401d589ca758af7909b517

    • SHA256

      f0a994ecc851b3456709d4e47191749b8e4c54d0d5f2a638b9972eadc9b200ef

    • SHA512

      13ecfd3b2384e5a8f31e3f7a493a0cd20a256c40892d44ff6a4f5869989f71923892618fd331eb3f01c97f3225229a08c99af358725c9b166d64f0738e6b8c56

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5y:gh+ZkldoPK8YaKGy

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks