General

  • Target

    677e627bb513c3cffe86522797f6350e98de398681851ebc7a33afc583390448.ppam

  • Size

    7KB

  • Sample

    240712-v43txavhng

  • MD5

    01c730f1624626e5e1494f27ffb17605

  • SHA1

    9028b0f9752bb5be30e24153c0d0e463f358f71c

  • SHA256

    677e627bb513c3cffe86522797f6350e98de398681851ebc7a33afc583390448

  • SHA512

    97a04f4189d0b9c95c4a76beaa46e9a34e031d602349d14dc489d29ce9b18dbdd2a3515a157b0f8daa1b61729335a25c0de24e604ca93a293109fab0573a6627

  • SSDEEP

    96:ZEKr9NP11z54AOBCXrThnmbV2OulCniyORirI364g6qUJdl+b72zuGp8zKNMk/jT:xrXP/z5bXpMUIc33jxJdls2ag8lkbMXE

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

win32.ddns.com.br:5222

Mutex

f32bcc90deea4

Targets

    • Target

      677e627bb513c3cffe86522797f6350e98de398681851ebc7a33afc583390448.ppam

    • Size

      7KB

    • MD5

      01c730f1624626e5e1494f27ffb17605

    • SHA1

      9028b0f9752bb5be30e24153c0d0e463f358f71c

    • SHA256

      677e627bb513c3cffe86522797f6350e98de398681851ebc7a33afc583390448

    • SHA512

      97a04f4189d0b9c95c4a76beaa46e9a34e031d602349d14dc489d29ce9b18dbdd2a3515a157b0f8daa1b61729335a25c0de24e604ca93a293109fab0573a6627

    • SSDEEP

      96:ZEKr9NP11z54AOBCXrThnmbV2OulCniyORirI364g6qUJdl+b72zuGp8zKNMk/jT:xrXP/z5bXpMUIc33jxJdls2ag8lkbMXE

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks