General

  • Target

    7038ff0c70c312df9b5335c484d0ae90_NeikiAnalytics.exe

  • Size

    951KB

  • Sample

    240523-b53qrahc89

  • MD5

    7038ff0c70c312df9b5335c484d0ae90

  • SHA1

    d5da33648b26c0efd3e66f91f0d2ccf2dfedf21d

  • SHA256

    9c58ec31bc9635ee1699eb091c2b014f79aca56cb2f4a133788328dd57602766

  • SHA512

    967c5bccfb8b1486e4fc3a00fdb39205a265300f4f025f9b2989454835150a5ce25e82e55cc2f348a21c44339cf81f6fb259a48fc94e34f062f85008d83d7587

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5o:Rh+ZkldDPK8YaKjo

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      7038ff0c70c312df9b5335c484d0ae90_NeikiAnalytics.exe

    • Size

      951KB

    • MD5

      7038ff0c70c312df9b5335c484d0ae90

    • SHA1

      d5da33648b26c0efd3e66f91f0d2ccf2dfedf21d

    • SHA256

      9c58ec31bc9635ee1699eb091c2b014f79aca56cb2f4a133788328dd57602766

    • SHA512

      967c5bccfb8b1486e4fc3a00fdb39205a265300f4f025f9b2989454835150a5ce25e82e55cc2f348a21c44339cf81f6fb259a48fc94e34f062f85008d83d7587

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5o:Rh+ZkldDPK8YaKjo

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks