General
-
Target
234504f9fcb3c9515f8034afdbee8571.bin
-
Size
9KB
-
Sample
240119-bg8l4adbc6
-
MD5
5f842a6c78dcf64ea578f8ddf0259aa2
-
SHA1
f94afe3fe1db065fb5254b9441c52269628078d4
-
SHA256
2d5e769896ee59e9293146f1e920f4525847b44483f41f2f1569a0f7628726ce
-
SHA512
b82e6dd7102fcfc4a7b7d8cb0d0562c90901c24455545a735df298483bbd5087be36f3cdc3fe9bd7658e897e8db0f1f593e8aed1aca61fdaeb4a028dea30205b
-
SSDEEP
192:IkDi5SIqlZ6+mFdFNlRWC6oVOrC7oBeLjbRhGdIJjUUKnT8nVuvRpTMC:Xs+CR+QOrCsBCrG0jSvRl
Static task
static1
Behavioral task
behavioral1
Sample
649d8fac10370a8922779669c5bbe8e93d4df493991ed8fa98a66de7b7d89560.ppam
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
649d8fac10370a8922779669c5bbe8e93d4df493991ed8fa98a66de7b7d89560.ppam
Resource
win10v2004-20231222-en
Malware Config
Extracted
revengerat
NyanCatRevenge
marcelotatuape.ddns.net:333
be78c084a935
Targets
-
-
Target
649d8fac10370a8922779669c5bbe8e93d4df493991ed8fa98a66de7b7d89560.ppam
-
Size
10KB
-
MD5
234504f9fcb3c9515f8034afdbee8571
-
SHA1
44bd1cb504fb04bc06eda1b4119b37cd7263f559
-
SHA256
649d8fac10370a8922779669c5bbe8e93d4df493991ed8fa98a66de7b7d89560
-
SHA512
62cc313c353a9750a77a265034a4a2deae2b6b6991935cd6c922002a5498606d3ddd02c66cee1906c0a4b90de7531f22390d0b9c1d4beedc078cc1926c3af11c
-
SSDEEP
192:xrXP/D4F6LgKM0wiLB9tZxWut0GkSskv/+KpOjN9nswlDDrCCDNHCtBq9p:dXPI60xsB9tZxWaPAKWNO+CCJf
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-