General

  • Target

    48d91586d247443c5cbbd927950b3bec

  • Size

    19KB

  • Sample

    240107-nk8sgsbghk

  • MD5

    48d91586d247443c5cbbd927950b3bec

  • SHA1

    fb974d5277648c07c6d2fa8434a10b979e5b0a76

  • SHA256

    8e8e8cedea88f51fdbc705062d254aeac987a2ea535daec168fac7870ac455e2

  • SHA512

    184270445bf812e483dc4f0346e7c2cd5b0fc7fa9e0b774e5d0abc0aa6d5f06d1e0eba78143ad5a2f59d2dbe43b0d2baacd26871eda74b675d716f5da6d07054

  • SSDEEP

    192:orROUv233KG0qvq9Zn5sm2mTUVeOlWjyC9TQNTPZ49JdRQVOBU1FGWPOpRE7xiae:AUz0qvq955sm6Ve9ymCTPaPsOWkE9wyG

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

polatelemder.duckdns.org:1604

Mutex

a8a25a74f5e84d779

Targets

    • Target

      48d91586d247443c5cbbd927950b3bec

    • Size

      19KB

    • MD5

      48d91586d247443c5cbbd927950b3bec

    • SHA1

      fb974d5277648c07c6d2fa8434a10b979e5b0a76

    • SHA256

      8e8e8cedea88f51fdbc705062d254aeac987a2ea535daec168fac7870ac455e2

    • SHA512

      184270445bf812e483dc4f0346e7c2cd5b0fc7fa9e0b774e5d0abc0aa6d5f06d1e0eba78143ad5a2f59d2dbe43b0d2baacd26871eda74b675d716f5da6d07054

    • SSDEEP

      192:orROUv233KG0qvq9Zn5sm2mTUVeOlWjyC9TQNTPZ49JdRQVOBU1FGWPOpRE7xiae:AUz0qvq955sm6Ve9ymCTPaPsOWkE9wyG

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

MITRE ATT&CK Matrix

Tasks