General

  • Target

    5eae465c829b0db4b94c8b669732c61e77aaeb53056c122143f33222088773bd_NeikiAnalytics.exe

  • Size

    903KB

  • Sample

    240623-l34kdayanf

  • MD5

    36cb7bb6d65a9512a5f7984ebc77e9a0

  • SHA1

    637b062bd8715338158b15e6bd1234131bf1b992

  • SHA256

    5eae465c829b0db4b94c8b669732c61e77aaeb53056c122143f33222088773bd

  • SHA512

    155f45dc29cf65f881628a54ce99d0270b507270fd109b0cf0394e6b851f38374991795eee7d924b8d449c86a45c17504c12f3bdc2e4827fb77e1458dbfad8ef

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5C:gh+ZkldoPK8YaKGC

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      5eae465c829b0db4b94c8b669732c61e77aaeb53056c122143f33222088773bd_NeikiAnalytics.exe

    • Size

      903KB

    • MD5

      36cb7bb6d65a9512a5f7984ebc77e9a0

    • SHA1

      637b062bd8715338158b15e6bd1234131bf1b992

    • SHA256

      5eae465c829b0db4b94c8b669732c61e77aaeb53056c122143f33222088773bd

    • SHA512

      155f45dc29cf65f881628a54ce99d0270b507270fd109b0cf0394e6b851f38374991795eee7d924b8d449c86a45c17504c12f3bdc2e4827fb77e1458dbfad8ef

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5C:gh+ZkldoPK8YaKGC

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks