General

  • Target

    55d0523f6546817d41d14d9d0205c68e009c87de7b38df108760f7e9cf45b2af

  • Size

    502KB

  • Sample

    220502-sdvdqshhhn

  • MD5

    9eb9d29aadde32e472b6e47394c194bd

  • SHA1

    7cee044c1235698aebd64fbaaac5a64cb47e0859

  • SHA256

    55d0523f6546817d41d14d9d0205c68e009c87de7b38df108760f7e9cf45b2af

  • SHA512

    d0c0e033a88ed7994125bea648f8708a1ce919e633e271c355d851021410d6e5b7bef878ea3a43d8fde0378b640e707720de9dc777bf581693387135eca96f62

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

github-58677.portmap.io:58677

Mutex

c1beda1126de489c96

Targets

    • Target

      55d0523f6546817d41d14d9d0205c68e009c87de7b38df108760f7e9cf45b2af

    • Size

      502KB

    • MD5

      9eb9d29aadde32e472b6e47394c194bd

    • SHA1

      7cee044c1235698aebd64fbaaac5a64cb47e0859

    • SHA256

      55d0523f6546817d41d14d9d0205c68e009c87de7b38df108760f7e9cf45b2af

    • SHA512

      d0c0e033a88ed7994125bea648f8708a1ce919e633e271c355d851021410d6e5b7bef878ea3a43d8fde0378b640e707720de9dc777bf581693387135eca96f62

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks