General
-
Target
Documentao.ppam
-
Size
17KB
-
Sample
230507-k816rsff3z
-
MD5
4f1c17e2da8035b8fd827f0fc93a1a40
-
SHA1
a47bf8b3d28d36279cb8a5a22f8c9a35206327a6
-
SHA256
aebe55c79817edcc4acff994e9dcb9230487092073bec48ea87448b90db1f888
-
SHA512
f80fb5e5f30191abd95bfec14637f2c7a47d8d1293cad3a9be20acafdd41aa5e833d17db8c65093a0c8b7d24b14e18a1d8092ef8acba5c4cd6a7dd6a620dc9b5
-
SSDEEP
384:dXPW8kJL8XaHgQOeE2kq9KkqkPGv9tMp4V9zNNxChJd:VPFaAn2kqnRctMgbNxChJd
Static task
static1
Behavioral task
behavioral1
Sample
Documentao.ppam
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Documentao.ppam
Resource
win10v2004-20230220-en
Malware Config
Extracted
revengerat
NyanCatRevenge
m7.ddns.com.br:5222
30c2ac3031a0
Targets
-
-
Target
Documentao.ppam
-
Size
17KB
-
MD5
4f1c17e2da8035b8fd827f0fc93a1a40
-
SHA1
a47bf8b3d28d36279cb8a5a22f8c9a35206327a6
-
SHA256
aebe55c79817edcc4acff994e9dcb9230487092073bec48ea87448b90db1f888
-
SHA512
f80fb5e5f30191abd95bfec14637f2c7a47d8d1293cad3a9be20acafdd41aa5e833d17db8c65093a0c8b7d24b14e18a1d8092ef8acba5c4cd6a7dd6a620dc9b5
-
SSDEEP
384:dXPW8kJL8XaHgQOeE2kq9KkqkPGv9tMp4V9zNNxChJd:VPFaAn2kqnRctMgbNxChJd
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-