General

  • Target

    2364-25-0x0000000000400000-0x000000000040A000-memory.dmp

  • Size

    40KB

  • MD5

    61d368a7288105a6ca9150c1fc5b356b

  • SHA1

    cfa36f8bbf6dc06d88d87a0b584db112d5b934a2

  • SHA256

    e03e02ff91a041dac5394acb3903105f8fe9318a13864f8d841b2dbd0e8991eb

  • SHA512

    7832d71af02bc3282ce27ef60e84a78038fe3033f35f260f0312abb53c763e92159b7bda55ef37772d7cb18989547548116d5db1c9d2a6e13a73a3c20f678ff5

  • SSDEEP

    192:Ng+8C+EKS0O9ejYTDG8bcp4LlTJl+B6MCn3vEW+DAJEBkGxVXZnkoNBRJ:NgNVjYTDG8gpKn++3vh+DCEnxzkoN

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

alice2019.myftp.biz:7777

Mutex

a915f6c5466a49

Signatures

  • Revengerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2364-25-0x0000000000400000-0x000000000040A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections