General

  • Target

    222eadd5230412cc1d35c16cad686976c5ac4d075a51e1f59ad1f10c69f628df_NeikiAnalytics.exe

  • Size

    951KB

  • Sample

    240625-3a5emszdme

  • MD5

    2b0ff679f02990ce8ea738c9add5ef00

  • SHA1

    8c98e17aacdfa73741e59b641f45b1a53d7c5b2d

  • SHA256

    222eadd5230412cc1d35c16cad686976c5ac4d075a51e1f59ad1f10c69f628df

  • SHA512

    3d7a29616e5a6911da118205001e9af68fdaeae7c57ba3458f712f4ade132af36bda6fda4242a016c18226f8e2ff1123fe30393a3549634664d001be9ca09092

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT54:Rh+ZkldDPK8YaKj4

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      222eadd5230412cc1d35c16cad686976c5ac4d075a51e1f59ad1f10c69f628df_NeikiAnalytics.exe

    • Size

      951KB

    • MD5

      2b0ff679f02990ce8ea738c9add5ef00

    • SHA1

      8c98e17aacdfa73741e59b641f45b1a53d7c5b2d

    • SHA256

      222eadd5230412cc1d35c16cad686976c5ac4d075a51e1f59ad1f10c69f628df

    • SHA512

      3d7a29616e5a6911da118205001e9af68fdaeae7c57ba3458f712f4ade132af36bda6fda4242a016c18226f8e2ff1123fe30393a3549634664d001be9ca09092

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT54:Rh+ZkldDPK8YaKj4

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks