General

  • Target

    38190e642c6c087841269d0eed948ec9fec7e378469d787af6d080d1e2b44dd3_NeikiAnalytics.exe

  • Size

    903KB

  • Sample

    240701-fxt6vs1akk

  • MD5

    478fc84b708a72155a816ef7381b6350

  • SHA1

    c101658ca4994cd9d0fa228627369865c3022369

  • SHA256

    38190e642c6c087841269d0eed948ec9fec7e378469d787af6d080d1e2b44dd3

  • SHA512

    ed2a47d45dfe3fb58bb9a95033c962d016aec3b83456cdda09a571be44b05b6632bf5ae173f32c59dc85e366c36ea33ade70253b05792e6e1dfda070ea91c1e8

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5a:gh+ZkldoPK8YaKGa

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      38190e642c6c087841269d0eed948ec9fec7e378469d787af6d080d1e2b44dd3_NeikiAnalytics.exe

    • Size

      903KB

    • MD5

      478fc84b708a72155a816ef7381b6350

    • SHA1

      c101658ca4994cd9d0fa228627369865c3022369

    • SHA256

      38190e642c6c087841269d0eed948ec9fec7e378469d787af6d080d1e2b44dd3

    • SHA512

      ed2a47d45dfe3fb58bb9a95033c962d016aec3b83456cdda09a571be44b05b6632bf5ae173f32c59dc85e366c36ea33ade70253b05792e6e1dfda070ea91c1e8

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5a:gh+ZkldoPK8YaKGa

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks