General

  • Target

    1468-138-0x0000000000400000-0x000000000040A000-memory.dmp

  • Size

    40KB

  • MD5

    61e19c234cbb76e9ed1c34557ce5d7e0

  • SHA1

    25ed23c2cb4b87bf42c000cfb528a2a50877581e

  • SHA256

    6bb6436c4ddadb0185c69afb8c7502c8c5dcc7d0404fbc090189c8b48e0a079c

  • SHA512

    bc48a418cced60a0ffc9d66330a1da343be6f562a1af75c8ab50e4c91f9887e68b3096ce79e8fad4b5325cfe171ab161614944414d83ff1d5fc67eb905bc07f9

  • SSDEEP

    192:a+8C+EKS0O9ejYTDG8bcp4LlzSnieXubWyD9JEBkGxVX7qoNgRJo:aNVjYTDG8gpqZeXTyD3EnxEoNr

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

marcelotatuape.ddns.net:333

Mutex

3b9ee4d4e0f34d7

Signatures

  • Revengerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1468-138-0x0000000000400000-0x000000000040A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections