General

  • Target

    d170365bcb19ce5d616456ff6c6c52f0N

  • Size

    904KB

  • Sample

    240910-lgmdzayckc

  • MD5

    d170365bcb19ce5d616456ff6c6c52f0

  • SHA1

    6c06724838d1c6be2e7213ae62c7c77f9e807644

  • SHA256

    d80f167ec7535e936cca48de49bab79e2956b91653e90a206a4d1d4e20272905

  • SHA512

    6b894fd9027cf1bfbf812f05fa3c9f2eadf09cb33dd1a323db57f2301463fcf0aa86dba84cd55005a27880ae4f45035865a847be21442a9cf59db389334e55a3

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5y:gh+ZkldoPK8YaKGy

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      d170365bcb19ce5d616456ff6c6c52f0N

    • Size

      904KB

    • MD5

      d170365bcb19ce5d616456ff6c6c52f0

    • SHA1

      6c06724838d1c6be2e7213ae62c7c77f9e807644

    • SHA256

      d80f167ec7535e936cca48de49bab79e2956b91653e90a206a4d1d4e20272905

    • SHA512

      6b894fd9027cf1bfbf812f05fa3c9f2eadf09cb33dd1a323db57f2301463fcf0aa86dba84cd55005a27880ae4f45035865a847be21442a9cf59db389334e55a3

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5y:gh+ZkldoPK8YaKGy

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks