General
-
Target
2343875e27c07a7b34b6e97c716568204881cd0588ca1f040774aa088504a605.ppam
-
Size
42KB
-
Sample
240807-btc1yszgle
-
MD5
20d950e2c3dfc7f4ed68900accdbe44c
-
SHA1
641722745cdfc41f32fa2c47dda5d0c3e708de10
-
SHA256
2343875e27c07a7b34b6e97c716568204881cd0588ca1f040774aa088504a605
-
SHA512
a4f6f2aeaba497b5f9fc740e4b6d34ce2b197c227a8c29499bb7ea1bb50ceb015c21ef92f8a7b35c418ff5b585d6aac96f723769e6095c42ad9ef39744ba921c
-
SSDEEP
768:VPvsRQIHQyna9M++zYElhWc0MGVY+EvR0nNy5UTBJLYYM3L35t0g+Ut/LdspuYzT:V8REE+o7fWc/v9Ul83D5t0g+m/LdsI8T
Static task
static1
Behavioral task
behavioral1
Sample
2343875e27c07a7b34b6e97c716568204881cd0588ca1f040774aa088504a605.ppam
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2343875e27c07a7b34b6e97c716568204881cd0588ca1f040774aa088504a605.ppam
Resource
win10v2004-20240802-en
Malware Config
Extracted
revengerat
NyanCatRevenge
18.228.173.171:5222
8b39f6245ef24a80
Targets
-
-
Target
2343875e27c07a7b34b6e97c716568204881cd0588ca1f040774aa088504a605.ppam
-
Size
42KB
-
MD5
20d950e2c3dfc7f4ed68900accdbe44c
-
SHA1
641722745cdfc41f32fa2c47dda5d0c3e708de10
-
SHA256
2343875e27c07a7b34b6e97c716568204881cd0588ca1f040774aa088504a605
-
SHA512
a4f6f2aeaba497b5f9fc740e4b6d34ce2b197c227a8c29499bb7ea1bb50ceb015c21ef92f8a7b35c418ff5b585d6aac96f723769e6095c42ad9ef39744ba921c
-
SSDEEP
768:VPvsRQIHQyna9M++zYElhWc0MGVY+EvR0nNy5UTBJLYYM3L35t0g+Ut/LdspuYzT:V8REE+o7fWc/v9Ul83D5t0g+m/LdsI8T
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-