General
-
Target
e2dfa50779e19898797df97530eb7c546f5a01a08560e83b3ae2b1e64f44143f
-
Size
390KB
-
Sample
220502-se9j2saadq
-
MD5
49a36c3fefe439b026e487b3058449b9
-
SHA1
4e2d0ee388679cf52d66573dc36fddc0475b866c
-
SHA256
e2dfa50779e19898797df97530eb7c546f5a01a08560e83b3ae2b1e64f44143f
-
SHA512
0c436994990cccaf8a42e371caa12d26001e30b6bf6220b339a4aedcb18c478dac16932b556c14cb3e439336e3baa64414d520309675543686b454f4c8b852a0
Static task
static1
Behavioral task
behavioral1
Sample
e2dfa50779e19898797df97530eb7c546f5a01a08560e83b3ae2b1e64f44143f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e2dfa50779e19898797df97530eb7c546f5a01a08560e83b3ae2b1e64f44143f.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
revengerat
NyanCatRevenge
github-58677.portmap.io:58677
c1beda1126de489c96
Targets
-
-
Target
e2dfa50779e19898797df97530eb7c546f5a01a08560e83b3ae2b1e64f44143f
-
Size
390KB
-
MD5
49a36c3fefe439b026e487b3058449b9
-
SHA1
4e2d0ee388679cf52d66573dc36fddc0475b866c
-
SHA256
e2dfa50779e19898797df97530eb7c546f5a01a08560e83b3ae2b1e64f44143f
-
SHA512
0c436994990cccaf8a42e371caa12d26001e30b6bf6220b339a4aedcb18c478dac16932b556c14cb3e439336e3baa64414d520309675543686b454f4c8b852a0
Score10/10-
Suspicious use of SetThreadContext
-