Resubmissions

21-07-2024 07:48

240721-jm6npayblm 10

20-07-2024 23:12

240720-263p9azcrh 10

General

  • Target

    22780ee2aab9bfd063acb647b08b8080N.exe

  • Size

    904KB

  • Sample

    240721-jm6npayblm

  • MD5

    22780ee2aab9bfd063acb647b08b8080

  • SHA1

    00cb29301e1ffb4eeab1bdf179638c8a46c5cd4d

  • SHA256

    fe3d1aa71f0d3acffa5c6f01be46f709d3bb5e7fc6e30d78d3910ebbf0d9764f

  • SHA512

    6250ded5f1faf1262b3f6834225b3b2b05e7bed25a8770e93b528aefa2c88ef0b49540f1589cfabb0f7b648e8fa261113dd1627d71696639f7c5f3573e780a47

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5m:gh+ZkldoPK8YaKGm

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      22780ee2aab9bfd063acb647b08b8080N.exe

    • Size

      904KB

    • MD5

      22780ee2aab9bfd063acb647b08b8080

    • SHA1

      00cb29301e1ffb4eeab1bdf179638c8a46c5cd4d

    • SHA256

      fe3d1aa71f0d3acffa5c6f01be46f709d3bb5e7fc6e30d78d3910ebbf0d9764f

    • SHA512

      6250ded5f1faf1262b3f6834225b3b2b05e7bed25a8770e93b528aefa2c88ef0b49540f1589cfabb0f7b648e8fa261113dd1627d71696639f7c5f3573e780a47

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5m:gh+ZkldoPK8YaKGm

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks