General

  • Target

    f1877a05b29ff71defc0f60d80713b14342333eb7515c77771f5419f480991cf.ppam

  • Size

    31KB

  • Sample

    240822-c7s5rsybqm

  • MD5

    9efc83953d1cd53c1e4a1cecb7c07828

  • SHA1

    2c95438d6db39af1f28addebc4180eab9b7599bb

  • SHA256

    f1877a05b29ff71defc0f60d80713b14342333eb7515c77771f5419f480991cf

  • SHA512

    3e437d50869d433047b8809cec6154eb5f1fd847ec865fa8afdd9b1e40c8e54a3be7ff34cf839f90735313901c53cbb675a43852af8acd0ea41f6d1349fb5201

  • SSDEEP

    768:VPAS2ACxYa9mLxarW2FV31TKppqfi3nOmS:VJvN5LxeW61+Dqfi3OB

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

18.228.165.84:3333

Mutex

788bf014999d4ae8929

Targets

    • Target

      f1877a05b29ff71defc0f60d80713b14342333eb7515c77771f5419f480991cf.ppam

    • Size

      31KB

    • MD5

      9efc83953d1cd53c1e4a1cecb7c07828

    • SHA1

      2c95438d6db39af1f28addebc4180eab9b7599bb

    • SHA256

      f1877a05b29ff71defc0f60d80713b14342333eb7515c77771f5419f480991cf

    • SHA512

      3e437d50869d433047b8809cec6154eb5f1fd847ec865fa8afdd9b1e40c8e54a3be7ff34cf839f90735313901c53cbb675a43852af8acd0ea41f6d1349fb5201

    • SSDEEP

      768:VPAS2ACxYa9mLxarW2FV31TKppqfi3nOmS:VJvN5LxeW61+Dqfi3OB

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks