General
-
Target
00029430335.ppam
-
Size
42KB
-
Sample
240806-yd4kasycmr
-
MD5
d8054ddc67b3d0d3e1f1aa109a3d5e7c
-
SHA1
58a0b86134040cbed1da7c37a47dfe40b8f3e265
-
SHA256
7e03e0cd53a9cb342d2fd8f709351618fcd6b79eff3d5e88705a699c28e6a9c6
-
SHA512
29b7267bda6d5061526331cc8123ed8af3fbe441d739e0fc27184ab0342b06b3cab6360a6f5bac664d86a69b26897b195a0ebc7167145b4e22fba2891fa39b1a
-
SSDEEP
768:VPlcbastluOGcXwktQArcyIsZ0NV3poringSYdvy/2lUr29oOYc6:Vd47laitbhw38U46e02Za
Static task
static1
Behavioral task
behavioral1
Sample
00029430335.ppam
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
00029430335.ppam
Resource
win10v2004-20240802-en
Malware Config
Extracted
revengerat
NyanCatRevenge
18.228.173.171:5222
8b39f6245ef24a80
Targets
-
-
Target
00029430335.ppam
-
Size
42KB
-
MD5
d8054ddc67b3d0d3e1f1aa109a3d5e7c
-
SHA1
58a0b86134040cbed1da7c37a47dfe40b8f3e265
-
SHA256
7e03e0cd53a9cb342d2fd8f709351618fcd6b79eff3d5e88705a699c28e6a9c6
-
SHA512
29b7267bda6d5061526331cc8123ed8af3fbe441d739e0fc27184ab0342b06b3cab6360a6f5bac664d86a69b26897b195a0ebc7167145b4e22fba2891fa39b1a
-
SSDEEP
768:VPlcbastluOGcXwktQArcyIsZ0NV3poringSYdvy/2lUr29oOYc6:Vd47laitbhw38U46e02Za
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-