General

  • Target

    234504f9fcb3c9515f8034afdbee8571.bin

  • Size

    9KB

  • Sample

    240119-bg8l4adbc6

  • MD5

    5f842a6c78dcf64ea578f8ddf0259aa2

  • SHA1

    f94afe3fe1db065fb5254b9441c52269628078d4

  • SHA256

    2d5e769896ee59e9293146f1e920f4525847b44483f41f2f1569a0f7628726ce

  • SHA512

    b82e6dd7102fcfc4a7b7d8cb0d0562c90901c24455545a735df298483bbd5087be36f3cdc3fe9bd7658e897e8db0f1f593e8aed1aca61fdaeb4a028dea30205b

  • SSDEEP

    192:IkDi5SIqlZ6+mFdFNlRWC6oVOrC7oBeLjbRhGdIJjUUKnT8nVuvRpTMC:Xs+CR+QOrCsBCrG0jSvRl

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

marcelotatuape.ddns.net:333

Mutex

be78c084a935

Targets

    • Target

      649d8fac10370a8922779669c5bbe8e93d4df493991ed8fa98a66de7b7d89560.ppam

    • Size

      10KB

    • MD5

      234504f9fcb3c9515f8034afdbee8571

    • SHA1

      44bd1cb504fb04bc06eda1b4119b37cd7263f559

    • SHA256

      649d8fac10370a8922779669c5bbe8e93d4df493991ed8fa98a66de7b7d89560

    • SHA512

      62cc313c353a9750a77a265034a4a2deae2b6b6991935cd6c922002a5498606d3ddd02c66cee1906c0a4b90de7531f22390d0b9c1d4beedc078cc1926c3af11c

    • SSDEEP

      192:xrXP/D4F6LgKM0wiLB9tZxWut0GkSskv/+KpOjN9nswlDDrCCDNHCtBq9p:dXPI60xsB9tZxWaPAKWNO+CCJf

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

1
T1018

Query Registry

1
T1012

Tasks