General

  • Target

    e31b5237571d3e5c757f5f73ce3a270e8337929e63b7e6385b2efd59716fada1N.exe

  • Size

    904KB

  • Sample

    250102-d88ghstnfr

  • MD5

    a1722d25cab94cb04d0ce79e201f52b0

  • SHA1

    6532eb620e97a09e95c836b33d314bb7dffcc9d6

  • SHA256

    e31b5237571d3e5c757f5f73ce3a270e8337929e63b7e6385b2efd59716fada1

  • SHA512

    453f7e5b3bc494ddf62e0059e2a1e027946cb5cbe74f1d4a79b67490bcb60775806ecf47fe7ea3933c344a78f167fa27ac548fd5f7140a19f775ead10df328b8

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa54:gh+ZkldoPK8YaKG4

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      e31b5237571d3e5c757f5f73ce3a270e8337929e63b7e6385b2efd59716fada1N.exe

    • Size

      904KB

    • MD5

      a1722d25cab94cb04d0ce79e201f52b0

    • SHA1

      6532eb620e97a09e95c836b33d314bb7dffcc9d6

    • SHA256

      e31b5237571d3e5c757f5f73ce3a270e8337929e63b7e6385b2efd59716fada1

    • SHA512

      453f7e5b3bc494ddf62e0059e2a1e027946cb5cbe74f1d4a79b67490bcb60775806ecf47fe7ea3933c344a78f167fa27ac548fd5f7140a19f775ead10df328b8

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa54:gh+ZkldoPK8YaKG4

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks