General

  • Target

    5af02c131e11b3bb47e11c80289767b7c296213c44985867c005cbb96cc68a0eN.exe

  • Size

    904KB

  • Sample

    241207-nb9y7azpht

  • MD5

    67ef0920baf6eb1b4b490a5d27450710

  • SHA1

    81430e91a14308c6c97a27101e748d09902d581a

  • SHA256

    5af02c131e11b3bb47e11c80289767b7c296213c44985867c005cbb96cc68a0e

  • SHA512

    4ee5fcfa9577635d52554892152881a40d45ca9fb039e44f311f2ef380823bebe7ba17058c61624af16930be5f0aa7c189e4a0f3a1cf27450d08312467a16b0d

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5J:gh+ZkldoPK8YaKGJ

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      5af02c131e11b3bb47e11c80289767b7c296213c44985867c005cbb96cc68a0eN.exe

    • Size

      904KB

    • MD5

      67ef0920baf6eb1b4b490a5d27450710

    • SHA1

      81430e91a14308c6c97a27101e748d09902d581a

    • SHA256

      5af02c131e11b3bb47e11c80289767b7c296213c44985867c005cbb96cc68a0e

    • SHA512

      4ee5fcfa9577635d52554892152881a40d45ca9fb039e44f311f2ef380823bebe7ba17058c61624af16930be5f0aa7c189e4a0f3a1cf27450d08312467a16b0d

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5J:gh+ZkldoPK8YaKGJ

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks