General

  • Target

    4e28ba0f57376c27b72f754fd20abd90N.exe

  • Size

    903KB

  • Sample

    240713-fskfvsxaml

  • MD5

    4e28ba0f57376c27b72f754fd20abd90

  • SHA1

    0dc1d33a0cefe906d0970f7af59c9669682ae44d

  • SHA256

    ba4b28b8dca976aa473dcd9de2a13fd82152cf35dffd6096aab3611319b0581d

  • SHA512

    e0a8e18d81d5efaefc17101337c679150ae9f0cca3e55971af58dc077444f45d15e7fb119f609e5fbc8fac093d2d9318a69d7247252a25cddef31e0756173b3c

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5X:gh+ZkldoPK8YaKGX

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      4e28ba0f57376c27b72f754fd20abd90N.exe

    • Size

      903KB

    • MD5

      4e28ba0f57376c27b72f754fd20abd90

    • SHA1

      0dc1d33a0cefe906d0970f7af59c9669682ae44d

    • SHA256

      ba4b28b8dca976aa473dcd9de2a13fd82152cf35dffd6096aab3611319b0581d

    • SHA512

      e0a8e18d81d5efaefc17101337c679150ae9f0cca3e55971af58dc077444f45d15e7fb119f609e5fbc8fac093d2d9318a69d7247252a25cddef31e0756173b3c

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5X:gh+ZkldoPK8YaKGX

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks