General

  • Target

    6df0af39b60212dfe64cea4abd4ec26d508cbd4d1dde4897cc8dfe8150e80a35

  • Size

    902KB

  • Sample

    250312-a7ntyastgs

  • MD5

    a7782fffff86858de42d880b0a2ddf95

  • SHA1

    18e0d2516c2238f6c4fe2983d7dc8a98fa113b0e

  • SHA256

    6df0af39b60212dfe64cea4abd4ec26d508cbd4d1dde4897cc8dfe8150e80a35

  • SHA512

    391d5543f8f174f84d6f4677b78ec3564d118de3b32444ef208c5c1e692284b1aa314ba69eb86c296162483733657586645c6457054dfa6759720f94760d301d

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5q:gh+ZkldoPK8YaKGq

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      6df0af39b60212dfe64cea4abd4ec26d508cbd4d1dde4897cc8dfe8150e80a35

    • Size

      902KB

    • MD5

      a7782fffff86858de42d880b0a2ddf95

    • SHA1

      18e0d2516c2238f6c4fe2983d7dc8a98fa113b0e

    • SHA256

      6df0af39b60212dfe64cea4abd4ec26d508cbd4d1dde4897cc8dfe8150e80a35

    • SHA512

      391d5543f8f174f84d6f4677b78ec3564d118de3b32444ef208c5c1e692284b1aa314ba69eb86c296162483733657586645c6457054dfa6759720f94760d301d

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5q:gh+ZkldoPK8YaKGq

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.