General

  • Target

    95f791bff942f932ff8bfbfbb99412363c2146e23e2fe00e0f492126bbcc2ff3_NeikiAnalytics.exe

  • Size

    903KB

  • Sample

    240622-n7fefsxcmc

  • MD5

    06124a9a1678b695e461cb6bca73db40

  • SHA1

    43aa1f813e53b8aee178fbf7c05978fa0eb57b46

  • SHA256

    95f791bff942f932ff8bfbfbb99412363c2146e23e2fe00e0f492126bbcc2ff3

  • SHA512

    2cb4ec7df1fb777c275c752c40bfd8519788621697c940c7053e859c7eb1d1f9c538cf3bd652aa4461f7f5439a5cdce975b00e88499e728bf742933029f29eff

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5V:gh+ZkldoPK8YaKGV

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      95f791bff942f932ff8bfbfbb99412363c2146e23e2fe00e0f492126bbcc2ff3_NeikiAnalytics.exe

    • Size

      903KB

    • MD5

      06124a9a1678b695e461cb6bca73db40

    • SHA1

      43aa1f813e53b8aee178fbf7c05978fa0eb57b46

    • SHA256

      95f791bff942f932ff8bfbfbb99412363c2146e23e2fe00e0f492126bbcc2ff3

    • SHA512

      2cb4ec7df1fb777c275c752c40bfd8519788621697c940c7053e859c7eb1d1f9c538cf3bd652aa4461f7f5439a5cdce975b00e88499e728bf742933029f29eff

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5V:gh+ZkldoPK8YaKGV

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks