General

  • Target

    15545db50eb64290e75d87fdf8b2d2a0_NeikiAnalytics.exe

  • Size

    903KB

  • Sample

    240612-b1f17axhma

  • MD5

    15545db50eb64290e75d87fdf8b2d2a0

  • SHA1

    aad143178cb658f3d7500eba31e4117a3ffd4460

  • SHA256

    1408b52e5631367bb5237d2ed3b9117a374cce9ecc8022493c8cda19e9f68ba1

  • SHA512

    4fbf351b5bd16943cf943490f5ce8e641b1b006195630be521591c9d31e600c8b92cf0af12a6ea5f292b110d74dcc5da985a980c99f8b562676116c9293f2c28

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5a:gh+ZkldoPK8YaKGa

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      15545db50eb64290e75d87fdf8b2d2a0_NeikiAnalytics.exe

    • Size

      903KB

    • MD5

      15545db50eb64290e75d87fdf8b2d2a0

    • SHA1

      aad143178cb658f3d7500eba31e4117a3ffd4460

    • SHA256

      1408b52e5631367bb5237d2ed3b9117a374cce9ecc8022493c8cda19e9f68ba1

    • SHA512

      4fbf351b5bd16943cf943490f5ce8e641b1b006195630be521591c9d31e600c8b92cf0af12a6ea5f292b110d74dcc5da985a980c99f8b562676116c9293f2c28

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5a:gh+ZkldoPK8YaKGa

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks