General

  • Target

    4da76b8b9a77254611b7c846c3b0fd70_NeikiAnalytics.exe

  • Size

    1.3MB

  • Sample

    240519-ceernscg92

  • MD5

    4da76b8b9a77254611b7c846c3b0fd70

  • SHA1

    5e41e6b8e26cdb580c00b661976dfc7ebf19ee3c

  • SHA256

    14d6c2508873b72d123a8063b996cbcfa5cb5b022b5354937380560e1f8ca3ff

  • SHA512

    dce8baa1b6ca143fceffeaf771eaad5e0d6cf0ef3eb43c86515d4eb691c09d246df0abbc462536f1840646fc04853bf50e8124baf2f414650f2179fc4b1e83a3

  • SSDEEP

    24576:uq5TfcdHj4fmbpD2qr24Hywe4CaeRzs1Ay6z5R03+dT3yozygK:uUTsam9xzHywe4C/s10dTA

Malware Config

Targets

    • Target

      4da76b8b9a77254611b7c846c3b0fd70_NeikiAnalytics.exe

    • Size

      1.3MB

    • MD5

      4da76b8b9a77254611b7c846c3b0fd70

    • SHA1

      5e41e6b8e26cdb580c00b661976dfc7ebf19ee3c

    • SHA256

      14d6c2508873b72d123a8063b996cbcfa5cb5b022b5354937380560e1f8ca3ff

    • SHA512

      dce8baa1b6ca143fceffeaf771eaad5e0d6cf0ef3eb43c86515d4eb691c09d246df0abbc462536f1840646fc04853bf50e8124baf2f414650f2179fc4b1e83a3

    • SSDEEP

      24576:uq5TfcdHj4fmbpD2qr24Hywe4CaeRzs1Ay6z5R03+dT3yozygK:uUTsam9xzHywe4C/s10dTA

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks