General

  • Target

    113a412967e933b94dabb14ae18b124adf27f94a4b795c1cdac69a13f64b9d01_NeikiAnalytics.exe

  • Size

    903KB

  • Sample

    240622-1lhnxavgqc

  • MD5

    bb96d2ba758dd5e369a29cdf2111b120

  • SHA1

    d313259a1e1235f9dc61f558b8a8597d73ac33ac

  • SHA256

    113a412967e933b94dabb14ae18b124adf27f94a4b795c1cdac69a13f64b9d01

  • SHA512

    1f72cf64a35fe55b2155df849060320cb2c79f5e2a238f4bc01a80a25a642d656726020543e1fe2ebfae68dd5c224c25edc2798301e5b6f41a6dd2dfe68e3dfc

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5u:gh+ZkldoPK8YaKGu

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      113a412967e933b94dabb14ae18b124adf27f94a4b795c1cdac69a13f64b9d01_NeikiAnalytics.exe

    • Size

      903KB

    • MD5

      bb96d2ba758dd5e369a29cdf2111b120

    • SHA1

      d313259a1e1235f9dc61f558b8a8597d73ac33ac

    • SHA256

      113a412967e933b94dabb14ae18b124adf27f94a4b795c1cdac69a13f64b9d01

    • SHA512

      1f72cf64a35fe55b2155df849060320cb2c79f5e2a238f4bc01a80a25a642d656726020543e1fe2ebfae68dd5c224c25edc2798301e5b6f41a6dd2dfe68e3dfc

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5u:gh+ZkldoPK8YaKGu

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks