General

  • Target

    00029430335.ppam

  • Size

    42KB

  • Sample

    240806-yd4kasycmr

  • MD5

    d8054ddc67b3d0d3e1f1aa109a3d5e7c

  • SHA1

    58a0b86134040cbed1da7c37a47dfe40b8f3e265

  • SHA256

    7e03e0cd53a9cb342d2fd8f709351618fcd6b79eff3d5e88705a699c28e6a9c6

  • SHA512

    29b7267bda6d5061526331cc8123ed8af3fbe441d739e0fc27184ab0342b06b3cab6360a6f5bac664d86a69b26897b195a0ebc7167145b4e22fba2891fa39b1a

  • SSDEEP

    768:VPlcbastluOGcXwktQArcyIsZ0NV3poringSYdvy/2lUr29oOYc6:Vd47laitbhw38U46e02Za

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

18.228.173.171:5222

Mutex

8b39f6245ef24a80

Targets

    • Target

      00029430335.ppam

    • Size

      42KB

    • MD5

      d8054ddc67b3d0d3e1f1aa109a3d5e7c

    • SHA1

      58a0b86134040cbed1da7c37a47dfe40b8f3e265

    • SHA256

      7e03e0cd53a9cb342d2fd8f709351618fcd6b79eff3d5e88705a699c28e6a9c6

    • SHA512

      29b7267bda6d5061526331cc8123ed8af3fbe441d739e0fc27184ab0342b06b3cab6360a6f5bac664d86a69b26897b195a0ebc7167145b4e22fba2891fa39b1a

    • SSDEEP

      768:VPlcbastluOGcXwktQArcyIsZ0NV3poringSYdvy/2lUr29oOYc6:Vd47laitbhw38U46e02Za

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks