General

  • Target

    03a85b7398362f995a6e6cbb51a6a190d3aa841a907fcaa3647cdab8c9d77df8_NeikiAnalytics.exe

  • Size

    951KB

  • Sample

    240619-x989zssglk

  • MD5

    024938e6a6cda66ccf2c532080ee4430

  • SHA1

    fc05750dde603ccb6ab003c8e3d385218e03e633

  • SHA256

    03a85b7398362f995a6e6cbb51a6a190d3aa841a907fcaa3647cdab8c9d77df8

  • SHA512

    e9ef56f857fbbb0009c2d543f5c37e00547329cabcfc3574e31fd58ab4b2758fcb2027d30e342c1017f14df892a74c08c115eaf823b4ff5c27609015d00550b4

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT53:Rh+ZkldDPK8YaKj3

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      03a85b7398362f995a6e6cbb51a6a190d3aa841a907fcaa3647cdab8c9d77df8_NeikiAnalytics.exe

    • Size

      951KB

    • MD5

      024938e6a6cda66ccf2c532080ee4430

    • SHA1

      fc05750dde603ccb6ab003c8e3d385218e03e633

    • SHA256

      03a85b7398362f995a6e6cbb51a6a190d3aa841a907fcaa3647cdab8c9d77df8

    • SHA512

      e9ef56f857fbbb0009c2d543f5c37e00547329cabcfc3574e31fd58ab4b2758fcb2027d30e342c1017f14df892a74c08c115eaf823b4ff5c27609015d00550b4

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT53:Rh+ZkldDPK8YaKj3

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks