General

  • Target

    kek.exe

  • Size

    14KB

  • MD5

    68974532c8f44695e93037387a4c144e

  • SHA1

    581dc09b37eaf8177757a0d02598b5f8d528a59b

  • SHA256

    0cf1fb98bec224f1b5060c40c4784e5a43b022e2ce105b920bca786a92d153c3

  • SHA512

    7aea74e4cabfdd66034537eb3421e1e01029b084139657f4ce93cd8bdd019ef843570d1b986653a54388dcbf60a1eb069ee4252c6e98ae3739a81d63134db87a

  • SSDEEP

    192:y+8C+EKS0O9ejYTDG8bcp4LlzSnieXubWyD9JEBkGxVXoqoNSRJo:yNVjYTDG8gpqZeXTyD3EnxXoNV

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

marcelotatuape.ddns.net:333

Mutex

da4b271c7cfc4bb

Signatures

  • Revengerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • kek.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections