General

  • Target

    2338d94b8e71e31a2f08912ca95071a0cd56ce80e65450cd94041ce5422ed641_NeikiAnalytics.exe

  • Size

    903KB

  • Sample

    240624-aqjtnazfre

  • MD5

    a07f69ad169c82ebb50f3a582c0cba70

  • SHA1

    0a16815067927a4e2059c4c1363532bc23673bcb

  • SHA256

    2338d94b8e71e31a2f08912ca95071a0cd56ce80e65450cd94041ce5422ed641

  • SHA512

    0b4a26c716755aae065529e35924dbcae1b0c543dacd1ed40d3366eb0578c962a7a492185930c07790b13dbbe88638224d5d84462789c64c16701799d34ad94a

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5N:gh+ZkldoPK8YaKGN

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      2338d94b8e71e31a2f08912ca95071a0cd56ce80e65450cd94041ce5422ed641_NeikiAnalytics.exe

    • Size

      903KB

    • MD5

      a07f69ad169c82ebb50f3a582c0cba70

    • SHA1

      0a16815067927a4e2059c4c1363532bc23673bcb

    • SHA256

      2338d94b8e71e31a2f08912ca95071a0cd56ce80e65450cd94041ce5422ed641

    • SHA512

      0b4a26c716755aae065529e35924dbcae1b0c543dacd1ed40d3366eb0578c962a7a492185930c07790b13dbbe88638224d5d84462789c64c16701799d34ad94a

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5N:gh+ZkldoPK8YaKGN

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks