General

  • Target

    2988-47-0x0000000000400000-0x000000000040A000-memory.dmp

  • Size

    40KB

  • MD5

    af5f62b63fafb03eb74c565ba1429773

  • SHA1

    fa960412a80a17b8b02b8d3e740d709c0b1d4bce

  • SHA256

    d8c19d81cc9cdea0808326b11a7d6bda0502accb25316495fa9a7996dc22d90d

  • SHA512

    451b41dde76d8335b5590be38eb29c3e7f1a6893760370ba6cd3d2e734f046d303a4eff216b55d6744d356d38a1557b415f4468f906f7e1965de46479553df80

  • SSDEEP

    192:V+8C+EKS0O9ejYTDG8bcp4Ll9unieXubWyD9JEBkGxVX7qoNFDRJ:VNVjYTDG8gpgNeXTyD3EnxgoN

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

craxsrat.ddns.com.br:333

Mutex

27d7e6701f5e

Signatures

  • Revengerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2988-47-0x0000000000400000-0x000000000040A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections