Behavioral task
behavioral1
Sample
2608-146-0x0000000000400000-0x000000000040A000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2608-146-0x0000000000400000-0x000000000040A000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2608-146-0x0000000000400000-0x000000000040A000-memory.dmp
-
Size
40KB
-
MD5
a47b39d879b281ba522974eae5e75515
-
SHA1
b2d8e77a88febd6153ef81b8b1b1c96474d97524
-
SHA256
14723984e12eb6fe1cb47b49a8d40ac77013743270d2172edd1dfa1255d5697e
-
SHA512
4f01f24955e152e6deaa8b2918e2bac5266c65f88f3a113e364d3bb684ee4995363b37b3d83b2027d10971a465c57de97d79396a900586d61462b8880ee92f8c
-
SSDEEP
192:ZFR+8Pa9S8kjYTDGgbcp4LlT+DoagDc0a2h6kZeEDK1ABkGxVXA8oNzgxRJm:ZPP/jYTDGggpa+DdgDc5EDYAnxXoNL
Malware Config
Extracted
revengerat
NyanCatRevenge
alice2019.myftp.biz:7575
a4765021d3
Signatures
-
Revengerat family
Files
-
2608-146-0x0000000000400000-0x000000000040A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ