General

  • Target

    4f1e286e688fd0cd4ae33fb5e038d03c26a6641df97b0a9074fd3319e6f560b4N.exe

  • Size

    904KB

  • Sample

    241219-fly1nszphp

  • MD5

    d8af44843491b39952150e8cfe236160

  • SHA1

    5e3bcd42f309bda14f658399f4528282f9519e89

  • SHA256

    4f1e286e688fd0cd4ae33fb5e038d03c26a6641df97b0a9074fd3319e6f560b4

  • SHA512

    347770de08d934aa2000f354f3dfef55cc9ce073c21df627a542e46e4bfa05d763a9fbf95fee53405ab887a38d06c573b933f484654625f179aa122649654916

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5R:gh+ZkldoPK8YaKGR

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      4f1e286e688fd0cd4ae33fb5e038d03c26a6641df97b0a9074fd3319e6f560b4N.exe

    • Size

      904KB

    • MD5

      d8af44843491b39952150e8cfe236160

    • SHA1

      5e3bcd42f309bda14f658399f4528282f9519e89

    • SHA256

      4f1e286e688fd0cd4ae33fb5e038d03c26a6641df97b0a9074fd3319e6f560b4

    • SHA512

      347770de08d934aa2000f354f3dfef55cc9ce073c21df627a542e46e4bfa05d763a9fbf95fee53405ab887a38d06c573b933f484654625f179aa122649654916

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5R:gh+ZkldoPK8YaKGR

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks