General

  • Target

    405b8979084d2466c48fcaf7d7317b0c8de33ae39b5b35afc6d2ad90d65da345.exe

  • Size

    905KB

  • Sample

    250110-3db79svpdp

  • MD5

    74d2b0c080b09d661cffb16caf313bd4

  • SHA1

    c1a16a2fef013f50bf4265f4e84dba908b218202

  • SHA256

    405b8979084d2466c48fcaf7d7317b0c8de33ae39b5b35afc6d2ad90d65da345

  • SHA512

    063faae117a71bdc98488e306bf325a8fd86ee8539ab08bb42e9b847f28a61f8d991b8f2a0a051c66a5eeaa48b92eb2be1935df487ac7cbd4dccf5c666f07112

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5K:gh+ZkldoPK8YaKGK

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      405b8979084d2466c48fcaf7d7317b0c8de33ae39b5b35afc6d2ad90d65da345.exe

    • Size

      905KB

    • MD5

      74d2b0c080b09d661cffb16caf313bd4

    • SHA1

      c1a16a2fef013f50bf4265f4e84dba908b218202

    • SHA256

      405b8979084d2466c48fcaf7d7317b0c8de33ae39b5b35afc6d2ad90d65da345

    • SHA512

      063faae117a71bdc98488e306bf325a8fd86ee8539ab08bb42e9b847f28a61f8d991b8f2a0a051c66a5eeaa48b92eb2be1935df487ac7cbd4dccf5c666f07112

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5K:gh+ZkldoPK8YaKGK

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks