General

  • Target

    4bb7917f6adce433d84ac7ad6bdda000N.exe

  • Size

    904KB

  • Sample

    240722-c9wcxaxhmr

  • MD5

    4bb7917f6adce433d84ac7ad6bdda000

  • SHA1

    86acf6a2e33c9771066773f4616e3a9fd787aa9c

  • SHA256

    5348e8e5955c16a1a42bc6f02f99f42c7ee156192580ddc09c60af8846412e74

  • SHA512

    bd4c4683d42cefb48dc709d2f04df3807d54c9f3994ed0b783c29bc5a844a7e3ea9be16742146e2f401e7b51182ce2d78de040384c53dc1a778ab984a577f011

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5q:gh+ZkldoPK8YaKGq

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      4bb7917f6adce433d84ac7ad6bdda000N.exe

    • Size

      904KB

    • MD5

      4bb7917f6adce433d84ac7ad6bdda000

    • SHA1

      86acf6a2e33c9771066773f4616e3a9fd787aa9c

    • SHA256

      5348e8e5955c16a1a42bc6f02f99f42c7ee156192580ddc09c60af8846412e74

    • SHA512

      bd4c4683d42cefb48dc709d2f04df3807d54c9f3994ed0b783c29bc5a844a7e3ea9be16742146e2f401e7b51182ce2d78de040384c53dc1a778ab984a577f011

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5q:gh+ZkldoPK8YaKGq

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks