General

  • Target

    747b8cf18b5e97cca18cdd0a924705b85c48acf6081d52b7d7ed74dee24c610aN

  • Size

    904KB

  • Sample

    240929-k3tjqszfmh

  • MD5

    e4e3f916fc73828e1a75f97dced82080

  • SHA1

    8e5a1e722c886b6eff57199bc567a71ab55c6891

  • SHA256

    747b8cf18b5e97cca18cdd0a924705b85c48acf6081d52b7d7ed74dee24c610a

  • SHA512

    4b30bd3a68d8df87270919c9591058d8e841fa57c45a68116dcb4971eb5b5b5267946789309de90a75c63345aefc84d3dcbaf17bffc39d69e9f01e6178422223

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5O:gh+ZkldoPK8YaKGO

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      747b8cf18b5e97cca18cdd0a924705b85c48acf6081d52b7d7ed74dee24c610aN

    • Size

      904KB

    • MD5

      e4e3f916fc73828e1a75f97dced82080

    • SHA1

      8e5a1e722c886b6eff57199bc567a71ab55c6891

    • SHA256

      747b8cf18b5e97cca18cdd0a924705b85c48acf6081d52b7d7ed74dee24c610a

    • SHA512

      4b30bd3a68d8df87270919c9591058d8e841fa57c45a68116dcb4971eb5b5b5267946789309de90a75c63345aefc84d3dcbaf17bffc39d69e9f01e6178422223

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5O:gh+ZkldoPK8YaKGO

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks