General

  • Target

    0b9146b6f9a88f95d5e5dd00c531b58cc55e7be146c3e53c88205ca04c8036bd_NeikiAnalytics.exe

  • Size

    903KB

  • Sample

    240628-w6eers1hjj

  • MD5

    47f50651cfbafc83b54c3f8b1ab011d0

  • SHA1

    593cdd9bfc4ba534834d108f5eee3f1da2243daf

  • SHA256

    0b9146b6f9a88f95d5e5dd00c531b58cc55e7be146c3e53c88205ca04c8036bd

  • SHA512

    b4b18b3a10f4e85698fcf548811b308aa0b0c32b806e6bc31bf95e7a89121fa9952d5385da0f4be05bd7df7642e68b262e15b5ae0dd638c1fc74b58f86941783

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa51:gh+ZkldoPK8YaKG1

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      0b9146b6f9a88f95d5e5dd00c531b58cc55e7be146c3e53c88205ca04c8036bd_NeikiAnalytics.exe

    • Size

      903KB

    • MD5

      47f50651cfbafc83b54c3f8b1ab011d0

    • SHA1

      593cdd9bfc4ba534834d108f5eee3f1da2243daf

    • SHA256

      0b9146b6f9a88f95d5e5dd00c531b58cc55e7be146c3e53c88205ca04c8036bd

    • SHA512

      b4b18b3a10f4e85698fcf548811b308aa0b0c32b806e6bc31bf95e7a89121fa9952d5385da0f4be05bd7df7642e68b262e15b5ae0dd638c1fc74b58f86941783

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa51:gh+ZkldoPK8YaKG1

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks