General

  • Target

    7dd0b7477b826bd90c5d5218ef1888db90b310ba4221750f3038e372caa54bb9_NeikiAnalytics.exe

  • Size

    904KB

  • Sample

    240626-nmmyssvhpn

  • MD5

    887b877d0aad49832ba8538099a177f0

  • SHA1

    6b84d94009b89a9a4ba0ce984c16b77554358303

  • SHA256

    7dd0b7477b826bd90c5d5218ef1888db90b310ba4221750f3038e372caa54bb9

  • SHA512

    f9cef2adfd8243ea65be23395485fcbd90adef2207040ed3452155fe76be639a416c720593dd2c6442f671ab079dda77d01d38c60ccfbccaf7da9c639ac748e7

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5I:gh+ZkldoPK8YaKGI

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      7dd0b7477b826bd90c5d5218ef1888db90b310ba4221750f3038e372caa54bb9_NeikiAnalytics.exe

    • Size

      904KB

    • MD5

      887b877d0aad49832ba8538099a177f0

    • SHA1

      6b84d94009b89a9a4ba0ce984c16b77554358303

    • SHA256

      7dd0b7477b826bd90c5d5218ef1888db90b310ba4221750f3038e372caa54bb9

    • SHA512

      f9cef2adfd8243ea65be23395485fcbd90adef2207040ed3452155fe76be639a416c720593dd2c6442f671ab079dda77d01d38c60ccfbccaf7da9c639ac748e7

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5I:gh+ZkldoPK8YaKGI

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks