General
-
Target
REVENGER.jpg.ps1
-
Size
801KB
-
Sample
240719-pjezfs1bnm
-
MD5
f4935e63eaedf1f0392d19e27a9b8d0c
-
SHA1
8c4c053689ff800fc06225f3958b0cb3aece902a
-
SHA256
f30b759f79a6be1fd1dcb3536d412eb81e187700153522776f70a9c4e8ff3b45
-
SHA512
7add6d57d8d70703178892a28d183ff88528d26f17c7438ec9e427cff55ed797a6b2dc909278d5cfea52321d2b9adc2b775b3673e031c2704ff5c3ba41eba0d6
-
SSDEEP
12288:OZmTk3LmZmTk3Lv2RDsUU1Vq2RDsUU1VV2RDsUU1V2:OZmTAKZmTAr25gq25gV25g2
Static task
static1
Behavioral task
behavioral1
Sample
REVENGER.jpg.ps1
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
REVENGER.jpg.ps1
Resource
win10v2004-20240709-en
Malware Config
Extracted
revengerat
NyanCatRevenge
lua.ddns.com.br:5222
101f19215cac
Targets
-
-
Target
REVENGER.jpg.ps1
-
Size
801KB
-
MD5
f4935e63eaedf1f0392d19e27a9b8d0c
-
SHA1
8c4c053689ff800fc06225f3958b0cb3aece902a
-
SHA256
f30b759f79a6be1fd1dcb3536d412eb81e187700153522776f70a9c4e8ff3b45
-
SHA512
7add6d57d8d70703178892a28d183ff88528d26f17c7438ec9e427cff55ed797a6b2dc909278d5cfea52321d2b9adc2b775b3673e031c2704ff5c3ba41eba0d6
-
SSDEEP
12288:OZmTk3LmZmTk3Lv2RDsUU1Vq2RDsUU1VV2RDsUU1V2:OZmTAKZmTAr25gq25gV25g2
Score10/10-
Suspicious use of SetThreadContext
-