General

  • Target

    011ada88a640ea14559a65cd8ad46ea0_NeikiAnalytics.exe

  • Size

    903KB

  • Sample

    240616-yw4m1svhqd

  • MD5

    011ada88a640ea14559a65cd8ad46ea0

  • SHA1

    5b8ca5175133f2a778b1b3487b180ce48677fe1d

  • SHA256

    4fb919ac770ba38c2953e4e1291ed6e80f34208cc911eaf8b2374d2ee8d61e9b

  • SHA512

    c55d4242f3ab501353f09f59efd8ef516e619738562c9f0d52df893fad5e652315ec7c38b24f828751b200f53eb4dee0a9bb635b39216f59f502e8e39604304a

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5y:gh+ZkldoPK8YaKGy

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      011ada88a640ea14559a65cd8ad46ea0_NeikiAnalytics.exe

    • Size

      903KB

    • MD5

      011ada88a640ea14559a65cd8ad46ea0

    • SHA1

      5b8ca5175133f2a778b1b3487b180ce48677fe1d

    • SHA256

      4fb919ac770ba38c2953e4e1291ed6e80f34208cc911eaf8b2374d2ee8d61e9b

    • SHA512

      c55d4242f3ab501353f09f59efd8ef516e619738562c9f0d52df893fad5e652315ec7c38b24f828751b200f53eb4dee0a9bb635b39216f59f502e8e39604304a

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5y:gh+ZkldoPK8YaKGy

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks