Resubmissions

07-08-2024 01:25

240807-btc1yszgle 10

07-08-2024 01:11

240807-bkdacszejf 10

General

  • Target

    2343875e27c07a7b34b6e97c716568204881cd0588ca1f040774aa088504a605.ppam

  • Size

    42KB

  • Sample

    240807-btc1yszgle

  • MD5

    20d950e2c3dfc7f4ed68900accdbe44c

  • SHA1

    641722745cdfc41f32fa2c47dda5d0c3e708de10

  • SHA256

    2343875e27c07a7b34b6e97c716568204881cd0588ca1f040774aa088504a605

  • SHA512

    a4f6f2aeaba497b5f9fc740e4b6d34ce2b197c227a8c29499bb7ea1bb50ceb015c21ef92f8a7b35c418ff5b585d6aac96f723769e6095c42ad9ef39744ba921c

  • SSDEEP

    768:VPvsRQIHQyna9M++zYElhWc0MGVY+EvR0nNy5UTBJLYYM3L35t0g+Ut/LdspuYzT:V8REE+o7fWc/v9Ul83D5t0g+m/LdsI8T

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

18.228.173.171:5222

Mutex

8b39f6245ef24a80

Targets

    • Target

      2343875e27c07a7b34b6e97c716568204881cd0588ca1f040774aa088504a605.ppam

    • Size

      42KB

    • MD5

      20d950e2c3dfc7f4ed68900accdbe44c

    • SHA1

      641722745cdfc41f32fa2c47dda5d0c3e708de10

    • SHA256

      2343875e27c07a7b34b6e97c716568204881cd0588ca1f040774aa088504a605

    • SHA512

      a4f6f2aeaba497b5f9fc740e4b6d34ce2b197c227a8c29499bb7ea1bb50ceb015c21ef92f8a7b35c418ff5b585d6aac96f723769e6095c42ad9ef39744ba921c

    • SSDEEP

      768:VPvsRQIHQyna9M++zYElhWc0MGVY+EvR0nNy5UTBJLYYM3L35t0g+Ut/LdspuYzT:V8REE+o7fWc/v9Ul83D5t0g+m/LdsI8T

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks