General

  • Target

    5477b2e2c5fb67a4694e5b393b7dd450N.exe

  • Size

    904KB

  • Sample

    240817-ttya1avdnc

  • MD5

    5477b2e2c5fb67a4694e5b393b7dd450

  • SHA1

    9c09f3044baf8bcfc8d3071b2865a4b23b2575f6

  • SHA256

    d280e9591a3807355304dbaefee5dfdc2cae249564e1af3ca6475b7aae802362

  • SHA512

    56f3e4f999cb602afbdfc5d2e9addf179434137a814b839cd8a523dcda9882b21e98262bbe4d826738286e6f00ba76afbb5bfaa714a097fd69df4e2e6768b2b6

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5B:gh+ZkldoPK8YaKGB

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      5477b2e2c5fb67a4694e5b393b7dd450N.exe

    • Size

      904KB

    • MD5

      5477b2e2c5fb67a4694e5b393b7dd450

    • SHA1

      9c09f3044baf8bcfc8d3071b2865a4b23b2575f6

    • SHA256

      d280e9591a3807355304dbaefee5dfdc2cae249564e1af3ca6475b7aae802362

    • SHA512

      56f3e4f999cb602afbdfc5d2e9addf179434137a814b839cd8a523dcda9882b21e98262bbe4d826738286e6f00ba76afbb5bfaa714a097fd69df4e2e6768b2b6

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5B:gh+ZkldoPK8YaKGB

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks