General

  • Target

    84ef6f643f5f05c2545f4490f973e3903e888d057e95f94b3d394dcf2b53a4f0_NeikiAnalytics.exe

  • Size

    903KB

  • Sample

    240627-pnybla1fmf

  • MD5

    31403aeedfa71ddf1ba3754acf6be440

  • SHA1

    825caaacd8b43bac7c54389ecdc27aa62bf8ed72

  • SHA256

    84ef6f643f5f05c2545f4490f973e3903e888d057e95f94b3d394dcf2b53a4f0

  • SHA512

    2d532d8c82de0040648f37699c321f6c3e83f62a9a3941e1d55f79eef88fd09690e3b8671586d45483ad52db1b2ddf872c95ccf15409ba89ac066cd2b6c4e55b

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5m:gh+ZkldoPK8YaKGm

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      84ef6f643f5f05c2545f4490f973e3903e888d057e95f94b3d394dcf2b53a4f0_NeikiAnalytics.exe

    • Size

      903KB

    • MD5

      31403aeedfa71ddf1ba3754acf6be440

    • SHA1

      825caaacd8b43bac7c54389ecdc27aa62bf8ed72

    • SHA256

      84ef6f643f5f05c2545f4490f973e3903e888d057e95f94b3d394dcf2b53a4f0

    • SHA512

      2d532d8c82de0040648f37699c321f6c3e83f62a9a3941e1d55f79eef88fd09690e3b8671586d45483ad52db1b2ddf872c95ccf15409ba89ac066cd2b6c4e55b

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5m:gh+ZkldoPK8YaKGm

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks