General
-
Target
Detalhes Reserva.ppam
-
Size
10KB
-
Sample
240105-tt757sgcg4
-
MD5
836c98de1441fa0f9a5bcff58b665abf
-
SHA1
1b1897a2a0d907cc94d0706b5ec4abd73e1afcc1
-
SHA256
b4614240ec20d504a01d0782e88f2d2a0668b7afeb353427fe03ab22e3de8bd8
-
SHA512
e83e55d6a0629bb4f813b290e923e5ab0e34d93f726c5fe1de2f35ec9930f38f896dd098d528d6ff8d0411e76badeb5a5cc07146c7cbb74495653639b69264d0
-
SSDEEP
192:xrXP/72meEX+TgyGixbUlA9fsZ02w8DgtSqAnrb4KEv4V51IhDotEay51SpyYL:dXPqh5uSc038sNw04z13tgi
Static task
static1
Behavioral task
behavioral1
Sample
Detalhes Reserva.ppam
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Detalhes Reserva.ppam
Resource
win10v2004-20231222-en
Malware Config
Extracted
revengerat
NyanCatRevenge
marcelotatuape.ddns.net:333
44d14179ad9b4cceb4
Targets
-
-
Target
Detalhes Reserva.ppam
-
Size
10KB
-
MD5
836c98de1441fa0f9a5bcff58b665abf
-
SHA1
1b1897a2a0d907cc94d0706b5ec4abd73e1afcc1
-
SHA256
b4614240ec20d504a01d0782e88f2d2a0668b7afeb353427fe03ab22e3de8bd8
-
SHA512
e83e55d6a0629bb4f813b290e923e5ab0e34d93f726c5fe1de2f35ec9930f38f896dd098d528d6ff8d0411e76badeb5a5cc07146c7cbb74495653639b69264d0
-
SSDEEP
192:xrXP/72meEX+TgyGixbUlA9fsZ02w8DgtSqAnrb4KEv4V51IhDotEay51SpyYL:dXPqh5uSc038sNw04z13tgi
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-