Resubmissions

24-06-2024 05:16

240624-fyg8payajg 10

24-06-2024 03:34

240624-d463wszcmn 10

General

  • Target

    3802f3138bdcf85179e9dcfa807b9fa60c74940a3e0700033bcd66bf4bac414e_NeikiAnalytics.exe

  • Size

    904KB

  • Sample

    240624-d463wszcmn

  • MD5

    917a66eada69223ae424832513680900

  • SHA1

    14945fe8444471c4ae279724d5844be6569a08e8

  • SHA256

    3802f3138bdcf85179e9dcfa807b9fa60c74940a3e0700033bcd66bf4bac414e

  • SHA512

    e7e2f9df5a53970d34fe35879eed52772e0eddce268ed7683ec0b18dd14db1a59aed1c3cc8839a04f5cf2d0e79e4346a962b6545ab2662b7933c0451ef31379d

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5Y:gh+ZkldoPK8YaKGY

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      3802f3138bdcf85179e9dcfa807b9fa60c74940a3e0700033bcd66bf4bac414e_NeikiAnalytics.exe

    • Size

      904KB

    • MD5

      917a66eada69223ae424832513680900

    • SHA1

      14945fe8444471c4ae279724d5844be6569a08e8

    • SHA256

      3802f3138bdcf85179e9dcfa807b9fa60c74940a3e0700033bcd66bf4bac414e

    • SHA512

      e7e2f9df5a53970d34fe35879eed52772e0eddce268ed7683ec0b18dd14db1a59aed1c3cc8839a04f5cf2d0e79e4346a962b6545ab2662b7933c0451ef31379d

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5Y:gh+ZkldoPK8YaKGY

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks