General
-
Target
32654120000.ppa
-
Size
85KB
-
Sample
230507-a69d9aeb33
-
MD5
f73d28374566888ca72af46736a044c7
-
SHA1
a4186cef906d11a1af9c064b742449c1ea0dccd5
-
SHA256
924b64652f124bbf235affcb91f62ddd799456c8b7438842c322db64d1a3e4a4
-
SHA512
c7460d9b69519c206bb553a37f263c178bcfd5b3c1902cd400433248f2e7b01f776c92f8eb6cafd1f11818cd097c22960744d205de73c6649e71f468ef1afc52
-
SSDEEP
768:b2HgyYZ88pJ9lYsI4XrNK7LSdvsqQvb36aTZQSCmYDxB:bXyYZ88RlYsI4XrNKCdvgvb37VQnrx
Behavioral task
behavioral1
Sample
32654120000.pps
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
32654120000.pps
Resource
win10v2004-20230220-en
Malware Config
Extracted
revengerat
NyanCatRevenge
m7.ddns.com.br:5222
63165e63d56748c
Targets
-
-
Target
32654120000.ppa
-
Size
85KB
-
MD5
f73d28374566888ca72af46736a044c7
-
SHA1
a4186cef906d11a1af9c064b742449c1ea0dccd5
-
SHA256
924b64652f124bbf235affcb91f62ddd799456c8b7438842c322db64d1a3e4a4
-
SHA512
c7460d9b69519c206bb553a37f263c178bcfd5b3c1902cd400433248f2e7b01f776c92f8eb6cafd1f11818cd097c22960744d205de73c6649e71f468ef1afc52
-
SSDEEP
768:b2HgyYZ88pJ9lYsI4XrNK7LSdvsqQvb36aTZQSCmYDxB:bXyYZ88RlYsI4XrNKCdvgvb37VQnrx
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-