General

  • Target

    1036-99-0x0000000000090000-0x000000000009A000-memory.dmp

  • Size

    40KB

  • Sample

    230507-2xe8lahh51

  • MD5

    f43a39c78c6f3e4992b86c026bbf7254

  • SHA1

    dfe3e622375fecea316983705a567f2b819d305f

  • SHA256

    058845d4a442ef5b14a5e810647daef316fccffbc401cc075e4a013c0596988b

  • SHA512

    edd2cee49039f8f95975736d36cdb635c7352c62320de1b2b2c65da7e3a9da1b04f88c903c316deb1d30b56f5d58345c4d926375d2ad6af7211e6e7bbb9858a0

  • SSDEEP

    192:h+8C+EKS0O9ejYTDG8bcp4Ll9qnieXubWyD9JEBkGxVXOlqoNxRJ:hNVjYTDG8gpwxeXTyD3EnxFoN

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

m7.ddns.com.br:5222

Mutex

30c2ac3031a0

Targets

    • Target

      1036-99-0x0000000000090000-0x000000000009A000-memory.dmp

    • Size

      40KB

    • MD5

      f43a39c78c6f3e4992b86c026bbf7254

    • SHA1

      dfe3e622375fecea316983705a567f2b819d305f

    • SHA256

      058845d4a442ef5b14a5e810647daef316fccffbc401cc075e4a013c0596988b

    • SHA512

      edd2cee49039f8f95975736d36cdb635c7352c62320de1b2b2c65da7e3a9da1b04f88c903c316deb1d30b56f5d58345c4d926375d2ad6af7211e6e7bbb9858a0

    • SSDEEP

      192:h+8C+EKS0O9ejYTDG8bcp4Ll9qnieXubWyD9JEBkGxVXOlqoNxRJ:hNVjYTDG8gpwxeXTyD3EnxFoN

    Score
    3/10

MITRE ATT&CK Matrix

Tasks