General
-
Target
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7
-
Size
217KB
-
Sample
220508-jb73daebaj
-
MD5
28410510706c74c2ca6494f036ebbd94
-
SHA1
4068e6a8618dc47a08962f91121c7bedf51e2407
-
SHA256
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7
-
SHA512
f429fcba47b03e96be57219ecf7ff1d435510600eae6772bfddc11354d357325aaa140b6db16c8c0bdbfa6a615ff72223ed332472b7c02c7a8754d342a2cf952
Static task
static1
Behavioral task
behavioral1
Sample
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
revengerat
NyanCatRevenge
hpdndbnb.duckdns.org:2404
90a49aa7c27647e
Targets
-
-
Target
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7
-
Size
217KB
-
MD5
28410510706c74c2ca6494f036ebbd94
-
SHA1
4068e6a8618dc47a08962f91121c7bedf51e2407
-
SHA256
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7
-
SHA512
f429fcba47b03e96be57219ecf7ff1d435510600eae6772bfddc11354d357325aaa140b6db16c8c0bdbfa6a615ff72223ed332472b7c02c7a8754d342a2cf952
Score10/10-
Modifies WinLogon for persistence
-
Turns off Windows Defender SpyNet reporting
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-