General

  • Target

    2164-101-0x0000000007360000-0x000000000736A000-memory.dmp

  • Size

    40KB

  • MD5

    ef63e3c70c7452e75c97397da347805b

  • SHA1

    8785cb70ff3365777abab4a5f5f89bd94ac1408a

  • SHA256

    4ec777a2e61e53030d45efd6f1aaa938ce744a1e4eab4c529815ec1cb6c4df77

  • SHA512

    b29f72959602ba0a5ffbe434b6505c2327fc87e67044730c077e4341299f6c5f73d188303fca8c21f560bbaa18dfb9cd7644b326bef3a3b133c71397406f90f3

  • SSDEEP

    192:Z+8C+EKS0O9ejYTDG8bcp4LlzSnieXubWyD9JEBkGxVXhqoNtzARJo:ZNVjYTDG8gpqZeXTyD3EnxKoNtX

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

marcelotatuape.ddns.net:333

Mutex

5460683d206d4b5

Signatures

  • Revengerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2164-101-0x0000000007360000-0x000000000736A000-memory.dmp
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections