General

  • Target

    Reserva Cancelar.ppam

  • Size

    8KB

  • Sample

    231205-h2nkzshf71

  • MD5

    f7d4d5e2956183dce4ba10720c701152

  • SHA1

    03b9e2cc094459a6df2fed97f5883b83e982fdf6

  • SHA256

    d692617c7a65d2ba50d882b02dffaf94fd10ed3a7ba31ff8a075a43d67034387

  • SHA512

    b27699a17f1bcba03bd06c695212e186b433b0178eb0b039660a8c8358315c00c6309a9f77953608d6f48f0105d80b96a7e69e98681969864098750eb3731fd4

  • SSDEEP

    192:xrXP/cgesPouvhbzvPKPCyDwlLMYOHqvro3h:dXPne8ouvNPKPC2HqsR

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

marcelotatuape.ddns.net:333

Mutex

da4b271c7cfc4bb

Targets

    • Target

      Reserva Cancelar.ppam

    • Size

      8KB

    • MD5

      f7d4d5e2956183dce4ba10720c701152

    • SHA1

      03b9e2cc094459a6df2fed97f5883b83e982fdf6

    • SHA256

      d692617c7a65d2ba50d882b02dffaf94fd10ed3a7ba31ff8a075a43d67034387

    • SHA512

      b27699a17f1bcba03bd06c695212e186b433b0178eb0b039660a8c8358315c00c6309a9f77953608d6f48f0105d80b96a7e69e98681969864098750eb3731fd4

    • SSDEEP

      192:xrXP/cgesPouvhbzvPKPCyDwlLMYOHqvro3h:dXPne8ouvNPKPC2HqsR

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Remote System Discovery

1
T1018

Tasks