General

  • Target

    2724-130-0x0000000000400000-0x000000000040A000-memory.dmp

  • Size

    40KB

  • MD5

    7496c8bad710e7756a896050cb62b7c9

  • SHA1

    5634e8cf58b1c79dc897cf7809b038e1876d7a48

  • SHA256

    52b4d0e6365733339c45591ea47d116656a9cafac5307f40114be790860cc701

  • SHA512

    15869c1f9ea2ebf2ae03c71b72ff3e7490c0940bc05c9b221b5028684f63fe53c5834ea042db3cda5b53a8164d5c6db12af31dcd1b37b8d77d9aae36e9aac418

  • SSDEEP

    192:a+8C+EKS0O9ejYTDG8bcp4Ll3FsnieXubWyD9JEBkGxVX/qoNsRJE:aNVjYTDG8gpW9eXTyD3Enx0oND

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

marcelotatuape.ddns.net:333

Mutex

281db369c9dc4bc4b1

Signatures

  • Revengerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2724-130-0x0000000000400000-0x000000000040A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections