Resubmissions

15-07-2024 05:49

240715-gh6f1s1ckj 10

15-07-2024 02:42

240715-c63yksxang 10

General

  • Target

    66d5c1a511bb5ca3a84a9288348609a0N.exe

  • Size

    903KB

  • Sample

    240715-c63yksxang

  • MD5

    66d5c1a511bb5ca3a84a9288348609a0

  • SHA1

    e7d30ef6f71f8d3dda75def20f9a1746ebd4cc16

  • SHA256

    e5bde03827c28e5ec40a20cabed7244d5e9e05ae784b079fcf000412ca8d52a1

  • SHA512

    d7163df578117eb434835f763789ea137cf9812e7853733ed7be5ff0fc1e58fea28559c966d05f5fe7d924701b087a21c7085de101d341de41fce511af286573

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5k:gh+ZkldoPK8YaKGk

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      66d5c1a511bb5ca3a84a9288348609a0N.exe

    • Size

      903KB

    • MD5

      66d5c1a511bb5ca3a84a9288348609a0

    • SHA1

      e7d30ef6f71f8d3dda75def20f9a1746ebd4cc16

    • SHA256

      e5bde03827c28e5ec40a20cabed7244d5e9e05ae784b079fcf000412ca8d52a1

    • SHA512

      d7163df578117eb434835f763789ea137cf9812e7853733ed7be5ff0fc1e58fea28559c966d05f5fe7d924701b087a21c7085de101d341de41fce511af286573

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5k:gh+ZkldoPK8YaKGk

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks