General

  • Target

    390d8b8548c4df169e44bec796a255bfc388fd8a039ef158fe8970c1ca23834c_NeikiAnalytics.exe

  • Size

    951KB

  • Sample

    240629-akt3fawcqg

  • MD5

    b90c964b1040c2097e6803be9fc2bf20

  • SHA1

    af3605d9b8a17d7afc5a64214bd786fef28b13e1

  • SHA256

    390d8b8548c4df169e44bec796a255bfc388fd8a039ef158fe8970c1ca23834c

  • SHA512

    5e4e59d7d302ee61d1bfa422e080dc1fb40471c1eac041081d7b8a442fe8ed2ee1469e840ca3034bc06c95a111fa5c9fc2a200c773e0d6a665fba6892fc1d554

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT55:Rh+ZkldDPK8YaKj5

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      390d8b8548c4df169e44bec796a255bfc388fd8a039ef158fe8970c1ca23834c_NeikiAnalytics.exe

    • Size

      951KB

    • MD5

      b90c964b1040c2097e6803be9fc2bf20

    • SHA1

      af3605d9b8a17d7afc5a64214bd786fef28b13e1

    • SHA256

      390d8b8548c4df169e44bec796a255bfc388fd8a039ef158fe8970c1ca23834c

    • SHA512

      5e4e59d7d302ee61d1bfa422e080dc1fb40471c1eac041081d7b8a442fe8ed2ee1469e840ca3034bc06c95a111fa5c9fc2a200c773e0d6a665fba6892fc1d554

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT55:Rh+ZkldDPK8YaKj5

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks