General

  • Target

    096e20eaf345f49b1970f0b99d7c0490_NeikiAnalytics.exe

  • Size

    951KB

  • Sample

    240617-2ahefawgje

  • MD5

    096e20eaf345f49b1970f0b99d7c0490

  • SHA1

    1a2e761ab868eb9e88ce97eff1e634e52d6977ec

  • SHA256

    44d2ec1f48faaf922ffa4ea93f349de9641d6cd682a747d6ca6f880d881185d6

  • SHA512

    0848e3411b6c460e431fef93f46068fc7c25aa6ea73cecfd2e332b5ec6e349f894fe43d67b603c3bb9ac778893ca8ddc093275852e61b340087761a48821983f

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5o:Rh+ZkldDPK8YaKjo

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      096e20eaf345f49b1970f0b99d7c0490_NeikiAnalytics.exe

    • Size

      951KB

    • MD5

      096e20eaf345f49b1970f0b99d7c0490

    • SHA1

      1a2e761ab868eb9e88ce97eff1e634e52d6977ec

    • SHA256

      44d2ec1f48faaf922ffa4ea93f349de9641d6cd682a747d6ca6f880d881185d6

    • SHA512

      0848e3411b6c460e431fef93f46068fc7c25aa6ea73cecfd2e332b5ec6e349f894fe43d67b603c3bb9ac778893ca8ddc093275852e61b340087761a48821983f

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5o:Rh+ZkldDPK8YaKjo

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks