General

  • Target

    934b301c9ce24d6c53e514bd7f285993f9f18d730eaa3678b6b6d877f001f1a3N.exe

  • Size

    904KB

  • Sample

    241118-2wh8vsxglj

  • MD5

    2d5ede9b02f9ba8a2f6ecbb2dc00ce40

  • SHA1

    efa34671bdac0d6eaa0002de126556852fce8b12

  • SHA256

    934b301c9ce24d6c53e514bd7f285993f9f18d730eaa3678b6b6d877f001f1a3

  • SHA512

    126f976d41c502344e8bc4df4398630da734e90d9e67ebc50f331fb7e23ce6a3113a9907b1c8ff59e006f907f1c1d3ca12249a8ad2813b38e73338f645eb4434

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5e:gh+ZkldoPK8YaKGe

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      934b301c9ce24d6c53e514bd7f285993f9f18d730eaa3678b6b6d877f001f1a3N.exe

    • Size

      904KB

    • MD5

      2d5ede9b02f9ba8a2f6ecbb2dc00ce40

    • SHA1

      efa34671bdac0d6eaa0002de126556852fce8b12

    • SHA256

      934b301c9ce24d6c53e514bd7f285993f9f18d730eaa3678b6b6d877f001f1a3

    • SHA512

      126f976d41c502344e8bc4df4398630da734e90d9e67ebc50f331fb7e23ce6a3113a9907b1c8ff59e006f907f1c1d3ca12249a8ad2813b38e73338f645eb4434

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5e:gh+ZkldoPK8YaKGe

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks