General

  • Target

    613e8b0872c9fcb73c54ffe37615eada8a88821f78bf4f58f9913b3f3fbdab94

  • Size

    904KB

  • Sample

    241201-2hs6xazpfq

  • MD5

    7e99e4a618ec794f38849fe4f7419a36

  • SHA1

    5a84d9c48a6c714c5d23aec10cf70e95e8d79dc3

  • SHA256

    613e8b0872c9fcb73c54ffe37615eada8a88821f78bf4f58f9913b3f3fbdab94

  • SHA512

    f5d2339c15663a9c3a89a40ff62248ae1c4b720dddcf9f7350e74590446bfb1ec08e7e53c9bf894a31dd034d95a40bac358daab92ce3adc0957f561e45980196

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5g:gh+ZkldoPK8YaKGg

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      613e8b0872c9fcb73c54ffe37615eada8a88821f78bf4f58f9913b3f3fbdab94

    • Size

      904KB

    • MD5

      7e99e4a618ec794f38849fe4f7419a36

    • SHA1

      5a84d9c48a6c714c5d23aec10cf70e95e8d79dc3

    • SHA256

      613e8b0872c9fcb73c54ffe37615eada8a88821f78bf4f58f9913b3f3fbdab94

    • SHA512

      f5d2339c15663a9c3a89a40ff62248ae1c4b720dddcf9f7350e74590446bfb1ec08e7e53c9bf894a31dd034d95a40bac358daab92ce3adc0957f561e45980196

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5g:gh+ZkldoPK8YaKGg

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks