General
-
Target
55d0523f6546817d41d14d9d0205c68e009c87de7b38df108760f7e9cf45b2af
-
Size
502KB
-
Sample
220502-sdvdqshhhn
-
MD5
9eb9d29aadde32e472b6e47394c194bd
-
SHA1
7cee044c1235698aebd64fbaaac5a64cb47e0859
-
SHA256
55d0523f6546817d41d14d9d0205c68e009c87de7b38df108760f7e9cf45b2af
-
SHA512
d0c0e033a88ed7994125bea648f8708a1ce919e633e271c355d851021410d6e5b7bef878ea3a43d8fde0378b640e707720de9dc777bf581693387135eca96f62
Static task
static1
Behavioral task
behavioral1
Sample
55d0523f6546817d41d14d9d0205c68e009c87de7b38df108760f7e9cf45b2af.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
55d0523f6546817d41d14d9d0205c68e009c87de7b38df108760f7e9cf45b2af.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
revengerat
NyanCatRevenge
github-58677.portmap.io:58677
c1beda1126de489c96
Targets
-
-
Target
55d0523f6546817d41d14d9d0205c68e009c87de7b38df108760f7e9cf45b2af
-
Size
502KB
-
MD5
9eb9d29aadde32e472b6e47394c194bd
-
SHA1
7cee044c1235698aebd64fbaaac5a64cb47e0859
-
SHA256
55d0523f6546817d41d14d9d0205c68e009c87de7b38df108760f7e9cf45b2af
-
SHA512
d0c0e033a88ed7994125bea648f8708a1ce919e633e271c355d851021410d6e5b7bef878ea3a43d8fde0378b640e707720de9dc777bf581693387135eca96f62
Score10/10-
Suspicious use of SetThreadContext
-