General
-
Target
Reserva Detalhes.ppam
-
Size
12KB
-
Sample
240606-sblc2sgf79
-
MD5
ccf9ad38175132df46d557052a4189c7
-
SHA1
cfe31d9d10e6459f7d6c9cad1d7b1a001f049e7d
-
SHA256
68dd35d8e090d38ce3f32e1cd62cbc8694c1119eda4bdfb27d90a83e31336d92
-
SHA512
005ff866a2b2c406d3b7be8016d24a21fca21ceb31510accb73cdbca68e0eb76259b97fb6ec504ea397990a85c2b2d5c1a89de6c2245d953e6d97cfd39116347
-
SSDEEP
384:dXP8BPMpJA8+SC0hUYRknWyGzfisnru6C86:VP4PMpJ3vhJytou6P6
Static task
static1
Behavioral task
behavioral1
Sample
Reserva Detalhes.ppam
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Reserva Detalhes.ppam
Resource
win10v2004-20240426-en
Malware Config
Extracted
https://pastebin.com/raw/gk5zDwdG
https://drive.google.com/uc?export=download&id=
Extracted
revengerat
NyanCatRevenge
marcelotatuape.ddns.net:333
1702a2bb715848
Targets
-
-
Target
Reserva Detalhes.ppam
-
Size
12KB
-
MD5
ccf9ad38175132df46d557052a4189c7
-
SHA1
cfe31d9d10e6459f7d6c9cad1d7b1a001f049e7d
-
SHA256
68dd35d8e090d38ce3f32e1cd62cbc8694c1119eda4bdfb27d90a83e31336d92
-
SHA512
005ff866a2b2c406d3b7be8016d24a21fca21ceb31510accb73cdbca68e0eb76259b97fb6ec504ea397990a85c2b2d5c1a89de6c2245d953e6d97cfd39116347
-
SSDEEP
384:dXP8BPMpJA8+SC0hUYRknWyGzfisnru6C86:VP4PMpJ3vhJytou6P6
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-