General

  • Target

    fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65

  • Size

    556KB

  • Sample

    220319-21rqssbfbn

  • MD5

    5dac4954e8c9d4415b14e0e80fc1b409

  • SHA1

    324235096176442eead12015467597c175f1b002

  • SHA256

    fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65

  • SHA512

    ffdb33904be0297e97bd29b0e83a2a0ba9c2952219e8364edaf420cf8d3ae61ffc017e17b53f1acac3d57448715c5c6fc59adef6b127408493ac308b94ffe662

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

github-58677.portmap.io:58677

Mutex

d9b2ac78f4944456

Targets

    • Target

      fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65

    • Size

      556KB

    • MD5

      5dac4954e8c9d4415b14e0e80fc1b409

    • SHA1

      324235096176442eead12015467597c175f1b002

    • SHA256

      fb2da9f629fd5c61ab198a079218e281b5c32be693b733cb63eaaf07203a2b65

    • SHA512

      ffdb33904be0297e97bd29b0e83a2a0ba9c2952219e8364edaf420cf8d3ae61ffc017e17b53f1acac3d57448715c5c6fc59adef6b127408493ac308b94ffe662

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks