General

  • Target

    e5f6db1ac01eed40386a2190d85eaf330c1531916d33f5a45da8864b8826d2e5.exe

  • Size

    904KB

  • Sample

    241205-ea1vfstjbp

  • MD5

    a4798ca015de583d940334c28804fe88

  • SHA1

    c3e9fda4da6eab6093f3d5b66718ca78ca0605b0

  • SHA256

    e5f6db1ac01eed40386a2190d85eaf330c1531916d33f5a45da8864b8826d2e5

  • SHA512

    62b82fd27ce4d53073536c8f700a0a894eb481657dedd54f8918f0077cf1ea23a13c41805f4f4ffa5782cb279cc4c35e8f08f48549a0bde8b99471dbfc320d87

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5+:gh+ZkldoPK8YaKG+

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      e5f6db1ac01eed40386a2190d85eaf330c1531916d33f5a45da8864b8826d2e5.exe

    • Size

      904KB

    • MD5

      a4798ca015de583d940334c28804fe88

    • SHA1

      c3e9fda4da6eab6093f3d5b66718ca78ca0605b0

    • SHA256

      e5f6db1ac01eed40386a2190d85eaf330c1531916d33f5a45da8864b8826d2e5

    • SHA512

      62b82fd27ce4d53073536c8f700a0a894eb481657dedd54f8918f0077cf1ea23a13c41805f4f4ffa5782cb279cc4c35e8f08f48549a0bde8b99471dbfc320d87

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5+:gh+ZkldoPK8YaKG+

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks