General

  • Target

    e2dfa50779e19898797df97530eb7c546f5a01a08560e83b3ae2b1e64f44143f

  • Size

    390KB

  • Sample

    220502-se9j2saadq

  • MD5

    49a36c3fefe439b026e487b3058449b9

  • SHA1

    4e2d0ee388679cf52d66573dc36fddc0475b866c

  • SHA256

    e2dfa50779e19898797df97530eb7c546f5a01a08560e83b3ae2b1e64f44143f

  • SHA512

    0c436994990cccaf8a42e371caa12d26001e30b6bf6220b339a4aedcb18c478dac16932b556c14cb3e439336e3baa64414d520309675543686b454f4c8b852a0

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

github-58677.portmap.io:58677

Mutex

c1beda1126de489c96

Targets

    • Target

      e2dfa50779e19898797df97530eb7c546f5a01a08560e83b3ae2b1e64f44143f

    • Size

      390KB

    • MD5

      49a36c3fefe439b026e487b3058449b9

    • SHA1

      4e2d0ee388679cf52d66573dc36fddc0475b866c

    • SHA256

      e2dfa50779e19898797df97530eb7c546f5a01a08560e83b3ae2b1e64f44143f

    • SHA512

      0c436994990cccaf8a42e371caa12d26001e30b6bf6220b339a4aedcb18c478dac16932b556c14cb3e439336e3baa64414d520309675543686b454f4c8b852a0

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks