General

  • Target

    43b06e18609233056405f73af2a3a9a4d44fdb1446950626e3796d78a057b30e_NeikiAnalytics.exe

  • Size

    951KB

  • Sample

    240629-bp3e2sxdrh

  • MD5

    0b3867a0c98ae03a3403944acfe74fc0

  • SHA1

    5b17d7970aad69ae8cb8313aff2a16c3c93a361c

  • SHA256

    43b06e18609233056405f73af2a3a9a4d44fdb1446950626e3796d78a057b30e

  • SHA512

    771a292fc90683412ba04d0c6d4bc4354605e6d5eff764f2a6a67e66dd2d24be5449b4fd8412a846fa704b9ca2599bd7267c0df5360c5936f63d9f471b53e50e

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5Hp:Rh+ZkldDPK8YaKjHp

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      43b06e18609233056405f73af2a3a9a4d44fdb1446950626e3796d78a057b30e_NeikiAnalytics.exe

    • Size

      951KB

    • MD5

      0b3867a0c98ae03a3403944acfe74fc0

    • SHA1

      5b17d7970aad69ae8cb8313aff2a16c3c93a361c

    • SHA256

      43b06e18609233056405f73af2a3a9a4d44fdb1446950626e3796d78a057b30e

    • SHA512

      771a292fc90683412ba04d0c6d4bc4354605e6d5eff764f2a6a67e66dd2d24be5449b4fd8412a846fa704b9ca2599bd7267c0df5360c5936f63d9f471b53e50e

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5Hp:Rh+ZkldDPK8YaKjHp

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks