General

  • Target

    fda77c1c41d1112916495fb12d1509e0N.exe

  • Size

    903KB

  • Sample

    240721-w2whgs1fpp

  • MD5

    fda77c1c41d1112916495fb12d1509e0

  • SHA1

    b7f8212b0f5a06fc604b0db444e7e521e028e85a

  • SHA256

    8efdb8a741b77b4661f4333f0fc0a7591a06e086a89812d2bd18660a5ceec7d4

  • SHA512

    984c57364e7954a4b0118c2b56f6d039e7260a437d98c3f8747e2677d90161298b15eba9a10ece434cb0fdfa2a657763e1b0c1e31c717cc430f3e946982899d9

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5p:gh+ZkldoPK8YaKGp

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      fda77c1c41d1112916495fb12d1509e0N.exe

    • Size

      903KB

    • MD5

      fda77c1c41d1112916495fb12d1509e0

    • SHA1

      b7f8212b0f5a06fc604b0db444e7e521e028e85a

    • SHA256

      8efdb8a741b77b4661f4333f0fc0a7591a06e086a89812d2bd18660a5ceec7d4

    • SHA512

      984c57364e7954a4b0118c2b56f6d039e7260a437d98c3f8747e2677d90161298b15eba9a10ece434cb0fdfa2a657763e1b0c1e31c717cc430f3e946982899d9

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5p:gh+ZkldoPK8YaKGp

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks