General

  • Target

    b2d79b1f4974d886956b37f9f339bf47aecc927f8edc0e73aeed40cd26b992d2_NeikiAnalytics.exe

  • Size

    951KB

  • Sample

    240629-tq7p9stgkq

  • MD5

    66fe04f93cda21e3ee7b1f68a4735c80

  • SHA1

    d69274683c8175ed741f6ba4260517abaed9f5d2

  • SHA256

    b2d79b1f4974d886956b37f9f339bf47aecc927f8edc0e73aeed40cd26b992d2

  • SHA512

    d9b5e846bbd2e1ea81c5cf6f697465f27ce4705fae872c9f5a592cf8d8ac94edb951dd963694c1ace27e2181023bd249e3e51da761640900efbc7f567284838f

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT58:Rh+ZkldDPK8YaKj8

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      b2d79b1f4974d886956b37f9f339bf47aecc927f8edc0e73aeed40cd26b992d2_NeikiAnalytics.exe

    • Size

      951KB

    • MD5

      66fe04f93cda21e3ee7b1f68a4735c80

    • SHA1

      d69274683c8175ed741f6ba4260517abaed9f5d2

    • SHA256

      b2d79b1f4974d886956b37f9f339bf47aecc927f8edc0e73aeed40cd26b992d2

    • SHA512

      d9b5e846bbd2e1ea81c5cf6f697465f27ce4705fae872c9f5a592cf8d8ac94edb951dd963694c1ace27e2181023bd249e3e51da761640900efbc7f567284838f

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT58:Rh+ZkldDPK8YaKj8

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks