General

  • Target

    998623a5dbfd495eb486914e66fe4070N.exe

  • Size

    904KB

  • Sample

    240723-lemlyszank

  • MD5

    998623a5dbfd495eb486914e66fe4070

  • SHA1

    6db112bb8c9d617b6dbd23ccfd411f9204e90af3

  • SHA256

    668b9ede64eeab5a2c9015f36b8c6956fa53635ff9ca9cfefb294fc71942f613

  • SHA512

    8ceb531914b054a7eee315d8cae9e3ecc08ec400ff7834a294268f28f0c3519c079e957dc98f43c2b3d7518dcd42d8e88091062c20512313de27caeea7c5c415

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa58:gh+ZkldoPK8YaKG8

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      998623a5dbfd495eb486914e66fe4070N.exe

    • Size

      904KB

    • MD5

      998623a5dbfd495eb486914e66fe4070

    • SHA1

      6db112bb8c9d617b6dbd23ccfd411f9204e90af3

    • SHA256

      668b9ede64eeab5a2c9015f36b8c6956fa53635ff9ca9cfefb294fc71942f613

    • SHA512

      8ceb531914b054a7eee315d8cae9e3ecc08ec400ff7834a294268f28f0c3519c079e957dc98f43c2b3d7518dcd42d8e88091062c20512313de27caeea7c5c415

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa58:gh+ZkldoPK8YaKG8

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks