General
-
Target
8eaa41284ee98eae7e568fed773aee812fe476bf0f798211971dfb5262f9bfb0
-
Size
69KB
-
Sample
210228-gbclzheb1j
-
MD5
aae5b85ac8f341a325e42f9bf76ce086
-
SHA1
bb857abb794b51227311bb19091b48310e5347bf
-
SHA256
8eaa41284ee98eae7e568fed773aee812fe476bf0f798211971dfb5262f9bfb0
-
SHA512
4fd32c9feb4889a5fdef0987be907dad9dafada4dcffee9af7202e9865e541d68b3c07d62edc96998c6d244e29a2aaea398656609124eab9fd2377b291a02352
Static task
static1
Behavioral task
behavioral1
Sample
8eaa41284ee98eae7e568fed773aee812fe476bf0f798211971dfb5262f9bfb0.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
8eaa41284ee98eae7e568fed773aee812fe476bf0f798211971dfb5262f9bfb0.exe
Resource
win10v20201028
Malware Config
Extracted
revengerat
NyanCatRevenge
we404.ddns.net:4044
e3241919341243fb8
Targets
-
-
Target
8eaa41284ee98eae7e568fed773aee812fe476bf0f798211971dfb5262f9bfb0
-
Size
69KB
-
MD5
aae5b85ac8f341a325e42f9bf76ce086
-
SHA1
bb857abb794b51227311bb19091b48310e5347bf
-
SHA256
8eaa41284ee98eae7e568fed773aee812fe476bf0f798211971dfb5262f9bfb0
-
SHA512
4fd32c9feb4889a5fdef0987be907dad9dafada4dcffee9af7202e9865e541d68b3c07d62edc96998c6d244e29a2aaea398656609124eab9fd2377b291a02352
Score10/10-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-