General

  • Target

    e5c1c5f07567d9c2c6ad9b9298482420_NeikiAnalytics

  • Size

    903KB

  • Sample

    240516-vdsk9aed83

  • MD5

    e5c1c5f07567d9c2c6ad9b9298482420

  • SHA1

    d6a471ace3ed10847e8ca33a7855331d31e9efcd

  • SHA256

    22ca0d6fb2c0570afc21e424438a5dd2b6c270404f2879ddc96a418c36cf7e30

  • SHA512

    5a04017ab7f9a06a3572fbe8d2eae5d4d4962aaa51add7c6e288219ef3ee3b7d82310ead5fb3d4ebea0304e7b44331a831db31df3917c67d5730a14feac861a2

  • SSDEEP

    24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5t:gh+ZkldoPK8YaKGt

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      e5c1c5f07567d9c2c6ad9b9298482420_NeikiAnalytics

    • Size

      903KB

    • MD5

      e5c1c5f07567d9c2c6ad9b9298482420

    • SHA1

      d6a471ace3ed10847e8ca33a7855331d31e9efcd

    • SHA256

      22ca0d6fb2c0570afc21e424438a5dd2b6c270404f2879ddc96a418c36cf7e30

    • SHA512

      5a04017ab7f9a06a3572fbe8d2eae5d4d4962aaa51add7c6e288219ef3ee3b7d82310ead5fb3d4ebea0304e7b44331a831db31df3917c67d5730a14feac861a2

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5t:gh+ZkldoPK8YaKGt

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks