General

  • Target

    Documentao.ppam

  • Size

    17KB

  • Sample

    230507-k816rsff3z

  • MD5

    4f1c17e2da8035b8fd827f0fc93a1a40

  • SHA1

    a47bf8b3d28d36279cb8a5a22f8c9a35206327a6

  • SHA256

    aebe55c79817edcc4acff994e9dcb9230487092073bec48ea87448b90db1f888

  • SHA512

    f80fb5e5f30191abd95bfec14637f2c7a47d8d1293cad3a9be20acafdd41aa5e833d17db8c65093a0c8b7d24b14e18a1d8092ef8acba5c4cd6a7dd6a620dc9b5

  • SSDEEP

    384:dXPW8kJL8XaHgQOeE2kq9KkqkPGv9tMp4V9zNNxChJd:VPFaAn2kqnRctMgbNxChJd

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

m7.ddns.com.br:5222

Mutex

30c2ac3031a0

Targets

    • Target

      Documentao.ppam

    • Size

      17KB

    • MD5

      4f1c17e2da8035b8fd827f0fc93a1a40

    • SHA1

      a47bf8b3d28d36279cb8a5a22f8c9a35206327a6

    • SHA256

      aebe55c79817edcc4acff994e9dcb9230487092073bec48ea87448b90db1f888

    • SHA512

      f80fb5e5f30191abd95bfec14637f2c7a47d8d1293cad3a9be20acafdd41aa5e833d17db8c65093a0c8b7d24b14e18a1d8092ef8acba5c4cd6a7dd6a620dc9b5

    • SSDEEP

      384:dXPW8kJL8XaHgQOeE2kq9KkqkPGv9tMp4V9zNNxChJd:VPFaAn2kqnRctMgbNxChJd

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Tasks