General
-
Target
cancelar a reserva.ppam
-
Size
31KB
-
Sample
240821-jcc9dswfjd
-
MD5
9efc83953d1cd53c1e4a1cecb7c07828
-
SHA1
2c95438d6db39af1f28addebc4180eab9b7599bb
-
SHA256
f1877a05b29ff71defc0f60d80713b14342333eb7515c77771f5419f480991cf
-
SHA512
3e437d50869d433047b8809cec6154eb5f1fd847ec865fa8afdd9b1e40c8e54a3be7ff34cf839f90735313901c53cbb675a43852af8acd0ea41f6d1349fb5201
-
SSDEEP
768:VPAS2ACxYa9mLxarW2FV31TKppqfi3nOmS:VJvN5LxeW61+Dqfi3OB
Static task
static1
Behavioral task
behavioral1
Sample
cancelar a reserva.ppam
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cancelar a reserva.ppam
Resource
win10v2004-20240802-en
Malware Config
Extracted
revengerat
NyanCatRevenge
18.228.165.84:3333
788bf014999d4ae8929
Targets
-
-
Target
cancelar a reserva.ppam
-
Size
31KB
-
MD5
9efc83953d1cd53c1e4a1cecb7c07828
-
SHA1
2c95438d6db39af1f28addebc4180eab9b7599bb
-
SHA256
f1877a05b29ff71defc0f60d80713b14342333eb7515c77771f5419f480991cf
-
SHA512
3e437d50869d433047b8809cec6154eb5f1fd847ec865fa8afdd9b1e40c8e54a3be7ff34cf839f90735313901c53cbb675a43852af8acd0ea41f6d1349fb5201
-
SSDEEP
768:VPAS2ACxYa9mLxarW2FV31TKppqfi3nOmS:VJvN5LxeW61+Dqfi3OB
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-