General

  • Target

    82d73d73683a269b4401859dd4708050_NeikiAnalytics

  • Size

    903KB

  • Sample

    240516-c5y81agh84

  • MD5

    82d73d73683a269b4401859dd4708050

  • SHA1

    b377088cb798e42a1480546380d704020c3883d6

  • SHA256

    943ada01c92a4b07e9c7b19125a9d3b13327a82a9b8584fa448785ccc0c1a013

  • SHA512

    9b6cf82b073a0c108848d712f1d2971028fd32bdcf115292b118ee769472f0b95a138564c2a52182955542fff10a9c6ff4c93f3a6d644a6b3e624d3b764cbf25

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa57:gh+ZkldoPK8YaKG7

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      82d73d73683a269b4401859dd4708050_NeikiAnalytics

    • Size

      903KB

    • MD5

      82d73d73683a269b4401859dd4708050

    • SHA1

      b377088cb798e42a1480546380d704020c3883d6

    • SHA256

      943ada01c92a4b07e9c7b19125a9d3b13327a82a9b8584fa448785ccc0c1a013

    • SHA512

      9b6cf82b073a0c108848d712f1d2971028fd32bdcf115292b118ee769472f0b95a138564c2a52182955542fff10a9c6ff4c93f3a6d644a6b3e624d3b764cbf25

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa57:gh+ZkldoPK8YaKG7

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks