General

  • Target

    407e292b10fe5fb513be35204954ba20N.exe

  • Size

    904KB

  • Sample

    240725-a39kvaxcrq

  • MD5

    407e292b10fe5fb513be35204954ba20

  • SHA1

    b9bc08aa0d1d870cc459dc338b07b1000da0d6d7

  • SHA256

    1d0d2b10b4b6b69d5789853c3886686fc03f5964f3aa2241d5aa0c07ed788672

  • SHA512

    1512d9fc5cb8d5f5db4d075c0c75a2d6326d9847d535af546ee5d25f6fc7a1c8aebdc9993d61aa0a64d110e03c54e419f62a8d0c9b8efafb4a219589c7d473d5

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5i:gh+ZkldoPK8YaKGi

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      407e292b10fe5fb513be35204954ba20N.exe

    • Size

      904KB

    • MD5

      407e292b10fe5fb513be35204954ba20

    • SHA1

      b9bc08aa0d1d870cc459dc338b07b1000da0d6d7

    • SHA256

      1d0d2b10b4b6b69d5789853c3886686fc03f5964f3aa2241d5aa0c07ed788672

    • SHA512

      1512d9fc5cb8d5f5db4d075c0c75a2d6326d9847d535af546ee5d25f6fc7a1c8aebdc9993d61aa0a64d110e03c54e419f62a8d0c9b8efafb4a219589c7d473d5

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5i:gh+ZkldoPK8YaKGi

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks