General

  • Target

    Detalhes Reserva.ppam

  • Size

    10KB

  • Sample

    240117-rwvlsaghen

  • MD5

    234504f9fcb3c9515f8034afdbee8571

  • SHA1

    44bd1cb504fb04bc06eda1b4119b37cd7263f559

  • SHA256

    649d8fac10370a8922779669c5bbe8e93d4df493991ed8fa98a66de7b7d89560

  • SHA512

    62cc313c353a9750a77a265034a4a2deae2b6b6991935cd6c922002a5498606d3ddd02c66cee1906c0a4b90de7531f22390d0b9c1d4beedc078cc1926c3af11c

  • SSDEEP

    192:xrXP/D4F6LgKM0wiLB9tZxWut0GkSskv/+KpOjN9nswlDDrCCDNHCtBq9p:dXPI60xsB9tZxWaPAKWNO+CCJf

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

marcelotatuape.ddns.net:333

Mutex

be78c084a935

Targets

    • Target

      Detalhes Reserva.ppam

    • Size

      10KB

    • MD5

      234504f9fcb3c9515f8034afdbee8571

    • SHA1

      44bd1cb504fb04bc06eda1b4119b37cd7263f559

    • SHA256

      649d8fac10370a8922779669c5bbe8e93d4df493991ed8fa98a66de7b7d89560

    • SHA512

      62cc313c353a9750a77a265034a4a2deae2b6b6991935cd6c922002a5498606d3ddd02c66cee1906c0a4b90de7531f22390d0b9c1d4beedc078cc1926c3af11c

    • SSDEEP

      192:xrXP/D4F6LgKM0wiLB9tZxWut0GkSskv/+KpOjN9nswlDDrCCDNHCtBq9p:dXPI60xsB9tZxWaPAKWNO+CCJf

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

1
T1018

Tasks