General

  • Target

    216d4f8a9ccd9bc5557003df0f51ee90_NeikiAnalytics

  • Size

    902KB

  • Sample

    240513-1kmapseg9x

  • MD5

    216d4f8a9ccd9bc5557003df0f51ee90

  • SHA1

    0ff206297ef7ba792652495e2b1cd60c40655718

  • SHA256

    7f1496f5914fe3a3c86637c976e18ab4e8a68745b08b248bcd3106e3d1353c45

  • SHA512

    854d67e063f4b7dc3532cb28efbefa911acae40c197f9e373f38287f603f521ef76845b138d75f14f67bbcefd0cef1070377f290508a65c976af57ff1b9f45a3

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa59:gh+ZkldoPK8YaKG9

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      216d4f8a9ccd9bc5557003df0f51ee90_NeikiAnalytics

    • Size

      902KB

    • MD5

      216d4f8a9ccd9bc5557003df0f51ee90

    • SHA1

      0ff206297ef7ba792652495e2b1cd60c40655718

    • SHA256

      7f1496f5914fe3a3c86637c976e18ab4e8a68745b08b248bcd3106e3d1353c45

    • SHA512

      854d67e063f4b7dc3532cb28efbefa911acae40c197f9e373f38287f603f521ef76845b138d75f14f67bbcefd0cef1070377f290508a65c976af57ff1b9f45a3

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa59:gh+ZkldoPK8YaKG9

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks