General
-
Target
13efa382b10defb99bd1415a12ab885da5ba6773bd651f2a983239bf10bcd5c4
-
Size
151KB
-
Sample
220219-kzcf2sbbel
-
MD5
2617fabde3d4865c6838626ff1f08dd4
-
SHA1
1b30dd98a97c25f898b9a90765b9da65e5f59a85
-
SHA256
13efa382b10defb99bd1415a12ab885da5ba6773bd651f2a983239bf10bcd5c4
-
SHA512
10e525b6fd13fc268e4eecad4abe1ee5d81fb0ebba701c522b6ff2485954477ccdb9810ceb06d51183469f3e5f5e0af8935d20156e25d601d14e371d040af8b8
Static task
static1
Behavioral task
behavioral1
Sample
13efa382b10defb99bd1415a12ab885da5ba6773bd651f2a983239bf10bcd5c4.vbs
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
13efa382b10defb99bd1415a12ab885da5ba6773bd651f2a983239bf10bcd5c4.vbs
Resource
win10v2004-en-20220113
Malware Config
Extracted
revengerat
NyanCatRevenge
h0pe1759.ddns.net:6943
128f3f5311064da68d3
Targets
-
-
Target
13efa382b10defb99bd1415a12ab885da5ba6773bd651f2a983239bf10bcd5c4
-
Size
151KB
-
MD5
2617fabde3d4865c6838626ff1f08dd4
-
SHA1
1b30dd98a97c25f898b9a90765b9da65e5f59a85
-
SHA256
13efa382b10defb99bd1415a12ab885da5ba6773bd651f2a983239bf10bcd5c4
-
SHA512
10e525b6fd13fc268e4eecad4abe1ee5d81fb0ebba701c522b6ff2485954477ccdb9810ceb06d51183469f3e5f5e0af8935d20156e25d601d14e371d040af8b8
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Suspicious use of SetThreadContext
-