General

  • Target

    1872-97-0x0000000000400000-0x000000000040A000-memory.dmp

  • Size

    40KB

  • Sample

    230512-jdvvtsee2w

  • MD5

    2b942c6b952264736e0aa8f392da5b73

  • SHA1

    26fbf381cc7c2ccf20e39e5b6de823fe35639ea7

  • SHA256

    9a1ebf5114b8f96c4bf8b28e267df3347420eee48cee99ae14c164aed9eb05d8

  • SHA512

    63923d3ad6dbe48dcf88838dcb6d261e4008c1591eb8f5ef5f0526ba15f1435caf866e7cf7a808cbbe31890348870e0c3afc2f74b517eda8a9ca4a0d2778da79

  • SSDEEP

    192:h+8C+EKS0O9ejYTDG8bcp4Ll9qnieXubWyD9JEBkGxVXOlqoNxRJg:hNVjYTDG8gpwxeXTyD3EnxFoNi

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

m7.ddns.com.br:5222

Mutex

30c2ac3031a0

Targets

    • Target

      1872-97-0x0000000000400000-0x000000000040A000-memory.dmp

    • Size

      40KB

    • MD5

      2b942c6b952264736e0aa8f392da5b73

    • SHA1

      26fbf381cc7c2ccf20e39e5b6de823fe35639ea7

    • SHA256

      9a1ebf5114b8f96c4bf8b28e267df3347420eee48cee99ae14c164aed9eb05d8

    • SHA512

      63923d3ad6dbe48dcf88838dcb6d261e4008c1591eb8f5ef5f0526ba15f1435caf866e7cf7a808cbbe31890348870e0c3afc2f74b517eda8a9ca4a0d2778da79

    • SSDEEP

      192:h+8C+EKS0O9ejYTDG8bcp4Ll9qnieXubWyD9JEBkGxVXOlqoNxRJg:hNVjYTDG8gpwxeXTyD3EnxFoNi

    Score
    3/10

MITRE ATT&CK Matrix

Tasks