General

  • Target

    b5d9aa761f395708b95d3f9f5b5a1bd0N.exe

  • Size

    903KB

  • Sample

    240721-ndt1ra1cpl

  • MD5

    b5d9aa761f395708b95d3f9f5b5a1bd0

  • SHA1

    b251bcf2111fb5ba09acb49801ef585172cc49ea

  • SHA256

    91be5dd3d0e017cce8252c160645421220e85b6b03ae60e4627860833f826ed6

  • SHA512

    ac9a27dd6354a055b4e4c1d621c70e18dab421091c7b7efa0956a1fab163fa2d6d339ce48b211c21d8e2246cdbabeef032a9dd56ac11e2b49ef3662f2b89f034

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5Y:gh+ZkldoPK8YaKGY

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      b5d9aa761f395708b95d3f9f5b5a1bd0N.exe

    • Size

      903KB

    • MD5

      b5d9aa761f395708b95d3f9f5b5a1bd0

    • SHA1

      b251bcf2111fb5ba09acb49801ef585172cc49ea

    • SHA256

      91be5dd3d0e017cce8252c160645421220e85b6b03ae60e4627860833f826ed6

    • SHA512

      ac9a27dd6354a055b4e4c1d621c70e18dab421091c7b7efa0956a1fab163fa2d6d339ce48b211c21d8e2246cdbabeef032a9dd56ac11e2b49ef3662f2b89f034

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5Y:gh+ZkldoPK8YaKGY

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks