General
-
Target
00026391087.ppam
-
Size
19KB
-
Sample
230512-hfrqhsed3s
-
MD5
f2c6f5b43d73d91bb9eb0de2812ff7cb
-
SHA1
d4dbf0af4bfbd0f6ce0aadb9dcbbc30cebf36aad
-
SHA256
2fe97c1cb597d1812cfefe11ce2327da3d18e3cc16bacf38512db1cbd53570d5
-
SHA512
bd2abddb6f66c5f104925d48d6499ed336e52b43829ee42595f00382c69dccb4398822c8df565c31a44ea9fe12dc4fc31c953652a4698bdf6fbfa96df304a82a
-
SSDEEP
384:dXPWGaYOMHEG4upmXuB44OPJ8GfkXjedXRMx+CI/tQiZlyszuCqo9NRrccG:VPWGNO7kpme64C21Xjc2xXI/XTys6ARk
Static task
static1
Behavioral task
behavioral1
Sample
00026391087.ppam
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
00026391087.ppam
Resource
win10v2004-20230220-en
Malware Config
Extracted
revengerat
NyanCatRevenge
m7.ddns.com.br:5222
30c2ac3031a0
Targets
-
-
Target
00026391087.ppam
-
Size
19KB
-
MD5
f2c6f5b43d73d91bb9eb0de2812ff7cb
-
SHA1
d4dbf0af4bfbd0f6ce0aadb9dcbbc30cebf36aad
-
SHA256
2fe97c1cb597d1812cfefe11ce2327da3d18e3cc16bacf38512db1cbd53570d5
-
SHA512
bd2abddb6f66c5f104925d48d6499ed336e52b43829ee42595f00382c69dccb4398822c8df565c31a44ea9fe12dc4fc31c953652a4698bdf6fbfa96df304a82a
-
SSDEEP
384:dXPWGaYOMHEG4upmXuB44OPJ8GfkXjedXRMx+CI/tQiZlyszuCqo9NRrccG:VPWGNO7kpme64C21Xjc2xXI/XTys6ARk
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-