General

  • Target

    90c2f0a8ba4ef384eea5b2f85b5b587cf1d91d477cb5c1b36fcca34238174c48_NeikiAnalytics.exe

  • Size

    951KB

  • Sample

    240628-lcylfasaqb

  • MD5

    d16daab72eb753543b8f1f02007b1430

  • SHA1

    00c4b02e0f110f73bf89303f6daf4de343a0c8eb

  • SHA256

    90c2f0a8ba4ef384eea5b2f85b5b587cf1d91d477cb5c1b36fcca34238174c48

  • SHA512

    377ed883f2b35a3192f5b6e015467669df44b59cd695307cd1c0953df1d2e9a59b91e30d6e18dc147a19bde2c907502716ba4968d89a50d748f725d5e1a458a3

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5e:Rh+ZkldDPK8YaKje

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      90c2f0a8ba4ef384eea5b2f85b5b587cf1d91d477cb5c1b36fcca34238174c48_NeikiAnalytics.exe

    • Size

      951KB

    • MD5

      d16daab72eb753543b8f1f02007b1430

    • SHA1

      00c4b02e0f110f73bf89303f6daf4de343a0c8eb

    • SHA256

      90c2f0a8ba4ef384eea5b2f85b5b587cf1d91d477cb5c1b36fcca34238174c48

    • SHA512

      377ed883f2b35a3192f5b6e015467669df44b59cd695307cd1c0953df1d2e9a59b91e30d6e18dc147a19bde2c907502716ba4968d89a50d748f725d5e1a458a3

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5e:Rh+ZkldDPK8YaKje

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks