General

  • Target

    fb8bd3f8f839a0ed81077681d2942a54f7663cac002ae91df94d43c673fad19a

  • Size

    904KB

  • Sample

    240816-ggmbraserp

  • MD5

    b3a8f98306f723f9e64b689fe3f32301

  • SHA1

    c678037d58c9eee71952fd9e6778c5a61de06c36

  • SHA256

    fb8bd3f8f839a0ed81077681d2942a54f7663cac002ae91df94d43c673fad19a

  • SHA512

    e6f2300a4c1756dea695e2c8eac8bed913d9fee56d1f66cacc931cbb30a9b5f886285fe77ee9e237aa019cc4b54230ef32a19a5585495b685fcc0b55c5c75e25

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5A:gh+ZkldoPK8YaKGA

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      fb8bd3f8f839a0ed81077681d2942a54f7663cac002ae91df94d43c673fad19a

    • Size

      904KB

    • MD5

      b3a8f98306f723f9e64b689fe3f32301

    • SHA1

      c678037d58c9eee71952fd9e6778c5a61de06c36

    • SHA256

      fb8bd3f8f839a0ed81077681d2942a54f7663cac002ae91df94d43c673fad19a

    • SHA512

      e6f2300a4c1756dea695e2c8eac8bed913d9fee56d1f66cacc931cbb30a9b5f886285fe77ee9e237aa019cc4b54230ef32a19a5585495b685fcc0b55c5c75e25

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5A:gh+ZkldoPK8YaKGA

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks