General

  • Target

    91b4c9e469a7dd18ca4ee3defcf96e50_NeikiAnalytics

  • Size

    903KB

  • Sample

    240514-g1xltsdd7z

  • MD5

    91b4c9e469a7dd18ca4ee3defcf96e50

  • SHA1

    79f340e3742cae73e0108687d8a0ede1f5b1b826

  • SHA256

    df07cc35fed48874945767ea181ac93a4cc7a70bdbaf815a277ab7e97366f27a

  • SHA512

    d47d3bcf806841b575652cb28203152d05f59d32a64c0f74d67a5c10b41cb7cd4da325f8331ea973698e26b50b3ce3330509f871aa92075260ecc3307658ef8f

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5L:gh+ZkldoPK8YaKGL

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      91b4c9e469a7dd18ca4ee3defcf96e50_NeikiAnalytics

    • Size

      903KB

    • MD5

      91b4c9e469a7dd18ca4ee3defcf96e50

    • SHA1

      79f340e3742cae73e0108687d8a0ede1f5b1b826

    • SHA256

      df07cc35fed48874945767ea181ac93a4cc7a70bdbaf815a277ab7e97366f27a

    • SHA512

      d47d3bcf806841b575652cb28203152d05f59d32a64c0f74d67a5c10b41cb7cd4da325f8331ea973698e26b50b3ce3330509f871aa92075260ecc3307658ef8f

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5L:gh+ZkldoPK8YaKGL

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks