General

  • Target

    27584ea3c26dda0d80ecaea51f379c1a85c049592012cd88e942a04395b378a6_NeikiAnalytics.exe

  • Size

    951KB

  • Sample

    240702-cmzf2ssejd

  • MD5

    5e441153cf520b5d587f32b52eceb5c0

  • SHA1

    c36cfeae93ff04a63306c1faf42b04ede791d980

  • SHA256

    27584ea3c26dda0d80ecaea51f379c1a85c049592012cd88e942a04395b378a6

  • SHA512

    3c10523f3fa56df6f3e4672902763a7409e1e47502db155a35fbf62c747598108a6901b78c2c965e710ad0b08356d2da223a2aac2414b976ff8c672a84f3211b

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5B:Rh+ZkldDPK8YaKjB

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      27584ea3c26dda0d80ecaea51f379c1a85c049592012cd88e942a04395b378a6_NeikiAnalytics.exe

    • Size

      951KB

    • MD5

      5e441153cf520b5d587f32b52eceb5c0

    • SHA1

      c36cfeae93ff04a63306c1faf42b04ede791d980

    • SHA256

      27584ea3c26dda0d80ecaea51f379c1a85c049592012cd88e942a04395b378a6

    • SHA512

      3c10523f3fa56df6f3e4672902763a7409e1e47502db155a35fbf62c747598108a6901b78c2c965e710ad0b08356d2da223a2aac2414b976ff8c672a84f3211b

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5B:Rh+ZkldDPK8YaKjB

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks