General
-
Target
f3499767b9a757f79b6c92df777b9de33ff65b0f8c2f49eda60c6306d4c632dc
-
Size
282KB
-
Sample
220326-nq2w5agfhl
-
MD5
dece6e230754c2dd68b1f6d3c99daec0
-
SHA1
480a3c2e6cba0b6d8ac1ca43e18406d600ae3065
-
SHA256
f3499767b9a757f79b6c92df777b9de33ff65b0f8c2f49eda60c6306d4c632dc
-
SHA512
ffc69eb3396c0187371c28938727bf4900f5890589d7d727298ef2911f663e37ccddefcaf6ec6ac0a22f55ccc0416730e875222bca8a54194e759cadbb93f405
Static task
static1
Behavioral task
behavioral1
Sample
f3499767b9a757f79b6c92df777b9de33ff65b0f8c2f49eda60c6306d4c632dc.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
f3499767b9a757f79b6c92df777b9de33ff65b0f8c2f49eda60c6306d4c632dc.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
revengerat
NyanCatRevenge
xcosgate.ddns.net:2281
9bdaf219ee774b13b
Targets
-
-
Target
f3499767b9a757f79b6c92df777b9de33ff65b0f8c2f49eda60c6306d4c632dc
-
Size
282KB
-
MD5
dece6e230754c2dd68b1f6d3c99daec0
-
SHA1
480a3c2e6cba0b6d8ac1ca43e18406d600ae3065
-
SHA256
f3499767b9a757f79b6c92df777b9de33ff65b0f8c2f49eda60c6306d4c632dc
-
SHA512
ffc69eb3396c0187371c28938727bf4900f5890589d7d727298ef2911f663e37ccddefcaf6ec6ac0a22f55ccc0416730e875222bca8a54194e759cadbb93f405
Score10/10-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-