General

  • Target

    3a0ac9d64986445944e79b00685b1f46ef85d2857ba6fd6bbeaca4ce4292806b_NeikiAnalytics.exe

  • Size

    951KB

  • Sample

    240702-fzcplaxflg

  • MD5

    23eb6b5a73fe19884c846558fb26ad90

  • SHA1

    3ae7db1e18a7967e42eb4a41e7b712ab3c09b1d6

  • SHA256

    3a0ac9d64986445944e79b00685b1f46ef85d2857ba6fd6bbeaca4ce4292806b

  • SHA512

    06c29c44576f48d6d5bc76432161c4c9be0e6264023cf0db3d2f92abacaf5e4a8e1d0f98234158a179b9f0069f89221dc5375d349f9860ca25f8d0506c829d50

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT57:Rh+ZkldDPK8YaKj7

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      3a0ac9d64986445944e79b00685b1f46ef85d2857ba6fd6bbeaca4ce4292806b_NeikiAnalytics.exe

    • Size

      951KB

    • MD5

      23eb6b5a73fe19884c846558fb26ad90

    • SHA1

      3ae7db1e18a7967e42eb4a41e7b712ab3c09b1d6

    • SHA256

      3a0ac9d64986445944e79b00685b1f46ef85d2857ba6fd6bbeaca4ce4292806b

    • SHA512

      06c29c44576f48d6d5bc76432161c4c9be0e6264023cf0db3d2f92abacaf5e4a8e1d0f98234158a179b9f0069f89221dc5375d349f9860ca25f8d0506c829d50

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT57:Rh+ZkldDPK8YaKj7

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks