Analysis

  • max time kernel
    148s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2023 21:26

General

  • Target

    05ab6096bdf888ccffb02027a78de35c26618416b23d2b1a37a9b03ffe63b8e4.exe

  • Size

    89KB

  • MD5

    6a54d673db8827d2f38a84bf1a7f7cc4

  • SHA1

    3b5c381a6ef6da19ac68de6affc13bc23699bdb8

  • SHA256

    05ab6096bdf888ccffb02027a78de35c26618416b23d2b1a37a9b03ffe63b8e4

  • SHA512

    bab581a5edcd16d5f68433fd301ea6ef49cc4c1caa84db53407b9c7dee03de81142c0be2806ce91c5f315bf71e08389197a79acaefae9de446ef5df5851281c6

  • SSDEEP

    1536:zuH+Zdf7VQJDIg8LdLTlckWvSU6lYNG6avMk8A/oRc28r/SH4AtKVrOQu15tNVpu:z4+Xf7VQCg0dLTbPSNGNvtz/H/1OTpqL

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

mr7bashbab.ddns.net:59588

Mutex

1947dc3fb2

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

Processes

  • C:\Users\Admin\AppData\Local\Temp\05ab6096bdf888ccffb02027a78de35c26618416b23d2b1a37a9b03ffe63b8e4.exe
    "C:\Users\Admin\AppData\Local\Temp\05ab6096bdf888ccffb02027a78de35c26618416b23d2b1a37a9b03ffe63b8e4.exe"
    1⤵
      PID:1328

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1328-54-0x0000000000130000-0x000000000013E000-memory.dmp
      Filesize

      56KB

    • memory/1328-55-0x0000000000250000-0x000000000025A000-memory.dmp
      Filesize

      40KB

    • memory/1328-56-0x0000000075351000-0x0000000075353000-memory.dmp
      Filesize

      8KB