General

  • Target

    3b519fde32c5d38bbe75f034f35bb08c2075f84906ffb74d96753a2c0285e347_NeikiAnalytics.exe

  • Size

    951KB

  • Sample

    240701-g1retaxhpe

  • MD5

    d823b966b61862a027fa379bdfee8400

  • SHA1

    84cee94fbcf9e26cbd93e136dc995a1e5156844f

  • SHA256

    3b519fde32c5d38bbe75f034f35bb08c2075f84906ffb74d96753a2c0285e347

  • SHA512

    a86c4be54c3f63e92711dbddd8052c9989bfdacf96fd5222a4797acd89266505be8e7dd96414b3b9ec379870dca36996a65be0c3d49ada518b9c38002e5179bf

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT58:Rh+ZkldDPK8YaKj8

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      3b519fde32c5d38bbe75f034f35bb08c2075f84906ffb74d96753a2c0285e347_NeikiAnalytics.exe

    • Size

      951KB

    • MD5

      d823b966b61862a027fa379bdfee8400

    • SHA1

      84cee94fbcf9e26cbd93e136dc995a1e5156844f

    • SHA256

      3b519fde32c5d38bbe75f034f35bb08c2075f84906ffb74d96753a2c0285e347

    • SHA512

      a86c4be54c3f63e92711dbddd8052c9989bfdacf96fd5222a4797acd89266505be8e7dd96414b3b9ec379870dca36996a65be0c3d49ada518b9c38002e5179bf

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT58:Rh+ZkldDPK8YaKj8

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks