General

  • Target

    aabe13fca3d4b9e2813db8f552e0bfd0_NeikiAnalytics

  • Size

    1.4MB

  • Sample

    240509-v529rsea21

  • MD5

    aabe13fca3d4b9e2813db8f552e0bfd0

  • SHA1

    a5f142d524053fc681ab364c12ff99212eac4758

  • SHA256

    de110c481ca316e3f5858a9f53535991fcf40cb35ac385019c61e0acdaf5ac94

  • SHA512

    3ce892109225248c0a385364bf443f11d02ec0e6e84128051550b76cd470d1bb6f51e32645adff99f6b5162f2b1efb17c101cd803c0e97134cca4a7076a1504a

  • SSDEEP

    24576:vq5TfcdHj4fmbk2qwEzKJ9Ttr60lYYtWY2YPGO0zQJ9TtFaLnUMvkYtWYnYPqWt:vUTsam4xm5IYtWY2YPJ5DYtWYnYP1

Malware Config

Targets

    • Target

      aabe13fca3d4b9e2813db8f552e0bfd0_NeikiAnalytics

    • Size

      1.4MB

    • MD5

      aabe13fca3d4b9e2813db8f552e0bfd0

    • SHA1

      a5f142d524053fc681ab364c12ff99212eac4758

    • SHA256

      de110c481ca316e3f5858a9f53535991fcf40cb35ac385019c61e0acdaf5ac94

    • SHA512

      3ce892109225248c0a385364bf443f11d02ec0e6e84128051550b76cd470d1bb6f51e32645adff99f6b5162f2b1efb17c101cd803c0e97134cca4a7076a1504a

    • SSDEEP

      24576:vq5TfcdHj4fmbk2qwEzKJ9Ttr60lYYtWY2YPGO0zQJ9TtFaLnUMvkYtWYnYPqWt:vUTsam4xm5IYtWY2YPJ5DYtWYnYP1

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks