General
-
Target
a0c62d117ca24a43bc6ca8d4fd841429827728d46aed60ae0c1dd93e7d44c4c7.ppam
-
Size
34KB
-
Sample
240821-mv1destgqd
-
MD5
e6c62c08bcf6e855dcc57d4672f35f22
-
SHA1
1a314ad57695bc7c1eb5a56069680ba504bcd63d
-
SHA256
a0c62d117ca24a43bc6ca8d4fd841429827728d46aed60ae0c1dd93e7d44c4c7
-
SHA512
8d5bf322c93f8cbe4802b21b6a6151d57406eb600490d90d29eeee1485ffa80d643a3a4cabdff81b0789f2d4014178ee66be1087382d8c0972a324dabd249108
-
SSDEEP
768:VPJJIjv1RFbo18t+HpTa1lzv5Z4G2rQdSss+0WfqQ:VxJITFU8sEjv5krKS80Sl
Static task
static1
Behavioral task
behavioral1
Sample
a0c62d117ca24a43bc6ca8d4fd841429827728d46aed60ae0c1dd93e7d44c4c7.ppam
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a0c62d117ca24a43bc6ca8d4fd841429827728d46aed60ae0c1dd93e7d44c4c7.ppam
Resource
win10v2004-20240802-en
Malware Config
Extracted
revengerat
NyanCatRevenge
18.228.165.84:3333
788bf014999d4ae8929
Targets
-
-
Target
a0c62d117ca24a43bc6ca8d4fd841429827728d46aed60ae0c1dd93e7d44c4c7.ppam
-
Size
34KB
-
MD5
e6c62c08bcf6e855dcc57d4672f35f22
-
SHA1
1a314ad57695bc7c1eb5a56069680ba504bcd63d
-
SHA256
a0c62d117ca24a43bc6ca8d4fd841429827728d46aed60ae0c1dd93e7d44c4c7
-
SHA512
8d5bf322c93f8cbe4802b21b6a6151d57406eb600490d90d29eeee1485ffa80d643a3a4cabdff81b0789f2d4014178ee66be1087382d8c0972a324dabd249108
-
SSDEEP
768:VPJJIjv1RFbo18t+HpTa1lzv5Z4G2rQdSss+0WfqQ:VxJITFU8sEjv5krKS80Sl
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-