General

  • Target

    1872-97-0x0000000000400000-0x000000000040A000-memory.dmp

  • Size

    40KB

  • MD5

    2b942c6b952264736e0aa8f392da5b73

  • SHA1

    26fbf381cc7c2ccf20e39e5b6de823fe35639ea7

  • SHA256

    9a1ebf5114b8f96c4bf8b28e267df3347420eee48cee99ae14c164aed9eb05d8

  • SHA512

    63923d3ad6dbe48dcf88838dcb6d261e4008c1591eb8f5ef5f0526ba15f1435caf866e7cf7a808cbbe31890348870e0c3afc2f74b517eda8a9ca4a0d2778da79

  • SSDEEP

    192:h+8C+EKS0O9ejYTDG8bcp4Ll9qnieXubWyD9JEBkGxVXOlqoNxRJg:hNVjYTDG8gpwxeXTyD3EnxFoNi

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

m7.ddns.com.br:5222

Mutex

30c2ac3031a0

Signatures

  • Revengerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1872-97-0x0000000000400000-0x000000000040A000-memory.dmp
    .exe windows x86


    Headers

    Sections