General

  • Target

    14c612e5ce7bbf32d3f0d0990f5ff08cee97cdb832a1195a6b24e8aed205575e_NeikiAnalytics.exe

  • Size

    903KB

  • Sample

    240627-zeb24ssapl

  • MD5

    7463509cac9a81c7dc96d85747555150

  • SHA1

    85607bb31a52b3b7afc4c5e3217eb20b60757859

  • SHA256

    14c612e5ce7bbf32d3f0d0990f5ff08cee97cdb832a1195a6b24e8aed205575e

  • SHA512

    d69c93da277c74bad031253272c7bdc8f75f4d6e0568565819d06938ba792a3f5f3b833922525d7882c8255077853d56d0121ee8838d393efcb181f5721c0454

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa57:gh+ZkldoPK8YaKG7

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      14c612e5ce7bbf32d3f0d0990f5ff08cee97cdb832a1195a6b24e8aed205575e_NeikiAnalytics.exe

    • Size

      903KB

    • MD5

      7463509cac9a81c7dc96d85747555150

    • SHA1

      85607bb31a52b3b7afc4c5e3217eb20b60757859

    • SHA256

      14c612e5ce7bbf32d3f0d0990f5ff08cee97cdb832a1195a6b24e8aed205575e

    • SHA512

      d69c93da277c74bad031253272c7bdc8f75f4d6e0568565819d06938ba792a3f5f3b833922525d7882c8255077853d56d0121ee8838d393efcb181f5721c0454

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa57:gh+ZkldoPK8YaKG7

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks