General

  • Target

    Trojan.Win32.Nanocore.NE.MTB-9831be28e1e96fd7cc128a0083afaa29fe19bb5184b92a0834376b516148b9e8-NeikiAnalytics.exe

  • Size

    952KB

  • Sample

    240915-sshcqazdmf

  • MD5

    53cf1457bbc6ea5daf48199fd3e11100

  • SHA1

    63e9c1903e9e4a6e82611253cb222acdceea7dba

  • SHA256

    9831be28e1e96fd7cc128a0083afaa29fe19bb5184b92a0834376b516148b9e8

  • SHA512

    006e4cba327195fad815f1443d8c6e9c75e2319e9aa5cb43f564d8c8be4f42e4deba6ac2b9bc78b280417eec1653ecd73c98c619f71110cb9e2dde5d17664a68

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5i:Rh+ZkldDPK8YaKji

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      Trojan.Win32.Nanocore.NE.MTB-9831be28e1e96fd7cc128a0083afaa29fe19bb5184b92a0834376b516148b9e8-NeikiAnalytics.exe

    • Size

      952KB

    • MD5

      53cf1457bbc6ea5daf48199fd3e11100

    • SHA1

      63e9c1903e9e4a6e82611253cb222acdceea7dba

    • SHA256

      9831be28e1e96fd7cc128a0083afaa29fe19bb5184b92a0834376b516148b9e8

    • SHA512

      006e4cba327195fad815f1443d8c6e9c75e2319e9aa5cb43f564d8c8be4f42e4deba6ac2b9bc78b280417eec1653ecd73c98c619f71110cb9e2dde5d17664a68

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5i:Rh+ZkldDPK8YaKji

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks