General

  • Target

    7b90cb73628d493b2492d8d0d804864c4872978e158dcafe47d9c9d099580eef

  • Size

    904KB

  • Sample

    240728-am6t1szdqg

  • MD5

    0d47e578e8bdc4c3f9a0d2a79c641988

  • SHA1

    dde80548e3669e3fbe9087bf7d4d13003750e45a

  • SHA256

    7b90cb73628d493b2492d8d0d804864c4872978e158dcafe47d9c9d099580eef

  • SHA512

    3344e2a5b382fd936b17d35acb3241647c87783d22235935f45ca65b6748b6165ade16fce2738dca84fca4f565b29f931f0f743e4d8e1645e4732fd30c315d57

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5H:gh+ZkldoPK8YaKGH

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      7b90cb73628d493b2492d8d0d804864c4872978e158dcafe47d9c9d099580eef

    • Size

      904KB

    • MD5

      0d47e578e8bdc4c3f9a0d2a79c641988

    • SHA1

      dde80548e3669e3fbe9087bf7d4d13003750e45a

    • SHA256

      7b90cb73628d493b2492d8d0d804864c4872978e158dcafe47d9c9d099580eef

    • SHA512

      3344e2a5b382fd936b17d35acb3241647c87783d22235935f45ca65b6748b6165ade16fce2738dca84fca4f565b29f931f0f743e4d8e1645e4732fd30c315d57

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5H:gh+ZkldoPK8YaKGH

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks