General

  • Target

    e34036e928a0bff78882adb01feecfb6eed6533c927f10acfe2dfa6d63e182cfN

  • Size

    904KB

  • Sample

    241030-t5y2nsyner

  • MD5

    c719bf1e5489060c5808107c1449e540

  • SHA1

    8799c151dde1dc46d4c9e34b2e3da02748352123

  • SHA256

    e34036e928a0bff78882adb01feecfb6eed6533c927f10acfe2dfa6d63e182cf

  • SHA512

    4b0110a4302d0224c9223f0b2e5d4db52989cb7a2d2c4b3e2150240b23c81569dcfe5d1b8554f5512486ac8773bf76f0bef1e79ff3160c3ba0ca0337dae8d71b

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa59:gh+ZkldoPK8YaKG9

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      e34036e928a0bff78882adb01feecfb6eed6533c927f10acfe2dfa6d63e182cfN

    • Size

      904KB

    • MD5

      c719bf1e5489060c5808107c1449e540

    • SHA1

      8799c151dde1dc46d4c9e34b2e3da02748352123

    • SHA256

      e34036e928a0bff78882adb01feecfb6eed6533c927f10acfe2dfa6d63e182cf

    • SHA512

      4b0110a4302d0224c9223f0b2e5d4db52989cb7a2d2c4b3e2150240b23c81569dcfe5d1b8554f5512486ac8773bf76f0bef1e79ff3160c3ba0ca0337dae8d71b

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa59:gh+ZkldoPK8YaKG9

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks