General

  • Target

    185642be7946a67a1ab9fe91909a8c5ae231433798b23ea5a23dbd1d903b9897N.exe

  • Size

    904KB

  • Sample

    241118-q17w8syanj

  • MD5

    b07715babee8f85f895f19b75cb966c0

  • SHA1

    41ce046b181f8e96fb0caf6aab4fd25794a1b1ce

  • SHA256

    185642be7946a67a1ab9fe91909a8c5ae231433798b23ea5a23dbd1d903b9897

  • SHA512

    f0548db9ecea202c064b18899050b0cda76b047bb80378da6a4fdf138eb0412daf9226297f00e5392676acdbb73c7237544b974dcd26f1a467ff4c8949875389

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5U:gh+ZkldoPK8YaKGU

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      185642be7946a67a1ab9fe91909a8c5ae231433798b23ea5a23dbd1d903b9897N.exe

    • Size

      904KB

    • MD5

      b07715babee8f85f895f19b75cb966c0

    • SHA1

      41ce046b181f8e96fb0caf6aab4fd25794a1b1ce

    • SHA256

      185642be7946a67a1ab9fe91909a8c5ae231433798b23ea5a23dbd1d903b9897

    • SHA512

      f0548db9ecea202c064b18899050b0cda76b047bb80378da6a4fdf138eb0412daf9226297f00e5392676acdbb73c7237544b974dcd26f1a467ff4c8949875389

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5U:gh+ZkldoPK8YaKGU

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks