General

  • Target

    a2387a12f3da6d0627c8526b2beefccf42e3297c1d82ac4443b58445f9f3c4d6N.exe

  • Size

    904KB

  • Sample

    250101-xj3phsykcz

  • MD5

    172fdbc1bb1e2e637d1884a39271d1d0

  • SHA1

    272ba54b53e0a49c42da0b37ad657ba9767db10d

  • SHA256

    a2387a12f3da6d0627c8526b2beefccf42e3297c1d82ac4443b58445f9f3c4d6

  • SHA512

    3222093e0184bd623f538e229c077a2dde7c55c76b8711c8fa4dc2ae0cbe3243bded5b50dea801b4b8b7b8475ddc052eda0d9ad83ad8400d934787bdaa036f05

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa51:gh+ZkldoPK8YaKG1

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      a2387a12f3da6d0627c8526b2beefccf42e3297c1d82ac4443b58445f9f3c4d6N.exe

    • Size

      904KB

    • MD5

      172fdbc1bb1e2e637d1884a39271d1d0

    • SHA1

      272ba54b53e0a49c42da0b37ad657ba9767db10d

    • SHA256

      a2387a12f3da6d0627c8526b2beefccf42e3297c1d82ac4443b58445f9f3c4d6

    • SHA512

      3222093e0184bd623f538e229c077a2dde7c55c76b8711c8fa4dc2ae0cbe3243bded5b50dea801b4b8b7b8475ddc052eda0d9ad83ad8400d934787bdaa036f05

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa51:gh+ZkldoPK8YaKG1

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks