General

  • Target

    79c2a480606c4504cf03c5907904a850N.exe

  • Size

    904KB

  • Sample

    240819-1tay2axgqg

  • MD5

    79c2a480606c4504cf03c5907904a850

  • SHA1

    571216a851f50d04d41d02fc606b678dd97cddaa

  • SHA256

    07ddd870547e31c3f9d0c6c7046da1ecfdd5536f7e3cef7a92801d51e2368ef4

  • SHA512

    4c8f792e17fd7fc80ed4f526e80bdfbeabd7c713601ff617b9f70bf4513ad6361ba16ccc582cff912c2f465cc601a4a8a663244f681cd53e081b449a9a70b629

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5V:gh+ZkldoPK8YaKGV

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      79c2a480606c4504cf03c5907904a850N.exe

    • Size

      904KB

    • MD5

      79c2a480606c4504cf03c5907904a850

    • SHA1

      571216a851f50d04d41d02fc606b678dd97cddaa

    • SHA256

      07ddd870547e31c3f9d0c6c7046da1ecfdd5536f7e3cef7a92801d51e2368ef4

    • SHA512

      4c8f792e17fd7fc80ed4f526e80bdfbeabd7c713601ff617b9f70bf4513ad6361ba16ccc582cff912c2f465cc601a4a8a663244f681cd53e081b449a9a70b629

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5V:gh+ZkldoPK8YaKGV

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks