General

  • Target

    db9f5baf04d68ae315931edcd3b814ddc2e95f79847e5b52b94ec22ab926c065

  • Size

    904KB

  • Sample

    241011-dq9lvsxhnq

  • MD5

    19cd47e16fb3e9cdbad143f34b3e1fcf

  • SHA1

    04c303e9da2ee727cdec34ed1935b9ee4cc1e78a

  • SHA256

    db9f5baf04d68ae315931edcd3b814ddc2e95f79847e5b52b94ec22ab926c065

  • SHA512

    41512c3c233461d121ba5ba16b4ec77f38c3fb8fe2add286ad2ab4a501bac4fe3b7ddcbf59c2e98955c6fc144448be932def59bc60d94c6c94fe35c3d2007faf

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5B:gh+ZkldoPK8YaKGB

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      db9f5baf04d68ae315931edcd3b814ddc2e95f79847e5b52b94ec22ab926c065

    • Size

      904KB

    • MD5

      19cd47e16fb3e9cdbad143f34b3e1fcf

    • SHA1

      04c303e9da2ee727cdec34ed1935b9ee4cc1e78a

    • SHA256

      db9f5baf04d68ae315931edcd3b814ddc2e95f79847e5b52b94ec22ab926c065

    • SHA512

      41512c3c233461d121ba5ba16b4ec77f38c3fb8fe2add286ad2ab4a501bac4fe3b7ddcbf59c2e98955c6fc144448be932def59bc60d94c6c94fe35c3d2007faf

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5B:gh+ZkldoPK8YaKGB

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks