General
-
Target
Boleto2002301988master.ppam
-
Size
13KB
-
Sample
230507-g7flwsag4x
-
MD5
c323058745acd4feab0c15282709a04e
-
SHA1
8e5a988968000ecfa816352c52bd66490bc2b31a
-
SHA256
2e07606a2d33855138f2430c5aab7e1894e0e75efd2ab1b39ac76256614ca462
-
SHA512
fa719dcc24dca693779406ab5eca4f7f4a0bfb736cb91b0868105213c91e0733600a33b49b6fdf4a7bfbaed84ae4407127181b86f6ede9e6f69bcefcd60400c9
-
SSDEEP
384:dXPzPWrxbb3wiyhJ4eSTbhkIYGgAjLHU+zerK9p:VPObL7yz8hkIp5Vyw
Static task
static1
Behavioral task
behavioral1
Sample
Boleto2002301988master.ppam
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Boleto2002301988master.ppam
Resource
win10v2004-20230220-en
Malware Config
Extracted
revengerat
NyanCatRevenge
b2b.ddns.com.br:5222
d9261ef3301b4b86a95
Targets
-
-
Target
Boleto2002301988master.ppam
-
Size
13KB
-
MD5
c323058745acd4feab0c15282709a04e
-
SHA1
8e5a988968000ecfa816352c52bd66490bc2b31a
-
SHA256
2e07606a2d33855138f2430c5aab7e1894e0e75efd2ab1b39ac76256614ca462
-
SHA512
fa719dcc24dca693779406ab5eca4f7f4a0bfb736cb91b0868105213c91e0733600a33b49b6fdf4a7bfbaed84ae4407127181b86f6ede9e6f69bcefcd60400c9
-
SSDEEP
384:dXPzPWrxbb3wiyhJ4eSTbhkIYGgAjLHU+zerK9p:VPObL7yz8hkIp5Vyw
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-