General
-
Target
3b72fd533bb38633959f0ca2f60774a60b302b3d3455709608b087e30307b773
-
Size
74KB
-
Sample
220502-rkcxlaghel
-
MD5
93d98128d44836c7b02c072ad97909b5
-
SHA1
2ff18c31d28022b6f4bab69e82a130c03fbdc32c
-
SHA256
3b72fd533bb38633959f0ca2f60774a60b302b3d3455709608b087e30307b773
-
SHA512
963fa94059e9937195225574d7917937a2313705b7dd9625e9f1045379ba65e0525d27a8835073e608782db16d0c99072513e13978e9c943922fee3298dae0ca
Static task
static1
Behavioral task
behavioral1
Sample
3b72fd533bb38633959f0ca2f60774a60b302b3d3455709608b087e30307b773.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3b72fd533bb38633959f0ca2f60774a60b302b3d3455709608b087e30307b773.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
revengerat
NyanCatRevenge
travazap2.duckdns.org:2021
3ddc53446da
Targets
-
-
Target
3b72fd533bb38633959f0ca2f60774a60b302b3d3455709608b087e30307b773
-
Size
74KB
-
MD5
93d98128d44836c7b02c072ad97909b5
-
SHA1
2ff18c31d28022b6f4bab69e82a130c03fbdc32c
-
SHA256
3b72fd533bb38633959f0ca2f60774a60b302b3d3455709608b087e30307b773
-
SHA512
963fa94059e9937195225574d7917937a2313705b7dd9625e9f1045379ba65e0525d27a8835073e608782db16d0c99072513e13978e9c943922fee3298dae0ca
Score10/10-
Drops startup file
-