General

  • Target

    10b6eedbab1ec700249b030d4baa5e2a3bdce7c8714d6aba9adaffabbe9119bc_NeikiAnalytics.exe

  • Size

    904KB

  • Sample

    240625-z5tpvawfkp

  • MD5

    a1f3b936f6fbdd285314ec10410be780

  • SHA1

    3d81ecac37519ae695620ed9ae5e004580671dc0

  • SHA256

    10b6eedbab1ec700249b030d4baa5e2a3bdce7c8714d6aba9adaffabbe9119bc

  • SHA512

    7bd8dece90a9856342d8c31784f7eaada7143917bf296ce28a10edc986c124ed0d4df3bc4a935fd64d3ad4b32821836ad7962daba16efc3ab0c7c8a82e420e96

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5v:gh+ZkldoPK8YaKGv

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      10b6eedbab1ec700249b030d4baa5e2a3bdce7c8714d6aba9adaffabbe9119bc_NeikiAnalytics.exe

    • Size

      904KB

    • MD5

      a1f3b936f6fbdd285314ec10410be780

    • SHA1

      3d81ecac37519ae695620ed9ae5e004580671dc0

    • SHA256

      10b6eedbab1ec700249b030d4baa5e2a3bdce7c8714d6aba9adaffabbe9119bc

    • SHA512

      7bd8dece90a9856342d8c31784f7eaada7143917bf296ce28a10edc986c124ed0d4df3bc4a935fd64d3ad4b32821836ad7962daba16efc3ab0c7c8a82e420e96

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5v:gh+ZkldoPK8YaKGv

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks