General

  • Target

    b614e674b4b7681e81f052ef9c715cb0N.exe

  • Size

    904KB

  • Sample

    240721-nemm3a1cqj

  • MD5

    b614e674b4b7681e81f052ef9c715cb0

  • SHA1

    93b52af13f721c4efd22513ea4412e997a8fa2e5

  • SHA256

    564977b5d15dc8abc464a46e222db0f37c4582a2cc4e1eede25b033df9c7fa3d

  • SHA512

    abfc24eb28cf1e8c4fae74ec5d506a95cece30dbd2146b93bb1451b3776d7b9a56a3b50258e056d498cd2fe2f4781c3dd83ef5ae4fef2c616881ae1a65586307

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5n:gh+ZkldoPK8YaKGn

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      b614e674b4b7681e81f052ef9c715cb0N.exe

    • Size

      904KB

    • MD5

      b614e674b4b7681e81f052ef9c715cb0

    • SHA1

      93b52af13f721c4efd22513ea4412e997a8fa2e5

    • SHA256

      564977b5d15dc8abc464a46e222db0f37c4582a2cc4e1eede25b033df9c7fa3d

    • SHA512

      abfc24eb28cf1e8c4fae74ec5d506a95cece30dbd2146b93bb1451b3776d7b9a56a3b50258e056d498cd2fe2f4781c3dd83ef5ae4fef2c616881ae1a65586307

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5n:gh+ZkldoPK8YaKGn

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks