General

  • Target

    d62e2dd570e5d0910497c4a34ae67690_NeikiAnalytics.exe

  • Size

    903KB

  • Sample

    240616-fbg96stfpk

  • MD5

    d62e2dd570e5d0910497c4a34ae67690

  • SHA1

    e904cdb170db14975e6425953626d0fbd98d6332

  • SHA256

    341b3f7e66e764a0efd5cd25a1af9f20803263466d69a02c5f2f3fff06e5e57d

  • SHA512

    b64c1732e47cab34803e93864690c5d4e66943682f9a3883c21281cd91709253d5bdcb99df0af74900ba89fd57b2ed30f6563a3714bee304832f86078b43dd41

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5r:gh+ZkldoPK8YaKGr

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      d62e2dd570e5d0910497c4a34ae67690_NeikiAnalytics.exe

    • Size

      903KB

    • MD5

      d62e2dd570e5d0910497c4a34ae67690

    • SHA1

      e904cdb170db14975e6425953626d0fbd98d6332

    • SHA256

      341b3f7e66e764a0efd5cd25a1af9f20803263466d69a02c5f2f3fff06e5e57d

    • SHA512

      b64c1732e47cab34803e93864690c5d4e66943682f9a3883c21281cd91709253d5bdcb99df0af74900ba89fd57b2ed30f6563a3714bee304832f86078b43dd41

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5r:gh+ZkldoPK8YaKGr

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks