General
-
Target
c821cfc5e83b96365f4384312fa29e7407a42fb97871e8f1f23ab4a698c1b390.ppam
-
Size
32KB
-
Sample
240822-mygqgssgrd
-
MD5
7314737e8dfca524250fcd6508f11d17
-
SHA1
2d3156b0c3b5f3944abe6c86e7096e07ca53e052
-
SHA256
c821cfc5e83b96365f4384312fa29e7407a42fb97871e8f1f23ab4a698c1b390
-
SHA512
72f565623e7890bc5ce6efb3adb217d1602f485c327ca3b2a4e51f48709affa2a0190837031d48f1e4dc16a7ed78029f81b6f092dbc86cff1c675bf66e1c3e72
-
SSDEEP
768:VP5E4C674aDfgF+So703s1fhrI4dxDpe287hjMWHxN21ah5kZEeW:Vm4B8argYg6rI4dZE3KWn21Q5yEeW
Static task
static1
Behavioral task
behavioral1
Sample
c821cfc5e83b96365f4384312fa29e7407a42fb97871e8f1f23ab4a698c1b390.ppam
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c821cfc5e83b96365f4384312fa29e7407a42fb97871e8f1f23ab4a698c1b390.ppam
Resource
win10v2004-20240802-en
Malware Config
Extracted
revengerat
NyanCatRevenge
18.228.165.84:3333
788bf014999d4ae8929
Targets
-
-
Target
c821cfc5e83b96365f4384312fa29e7407a42fb97871e8f1f23ab4a698c1b390.ppam
-
Size
32KB
-
MD5
7314737e8dfca524250fcd6508f11d17
-
SHA1
2d3156b0c3b5f3944abe6c86e7096e07ca53e052
-
SHA256
c821cfc5e83b96365f4384312fa29e7407a42fb97871e8f1f23ab4a698c1b390
-
SHA512
72f565623e7890bc5ce6efb3adb217d1602f485c327ca3b2a4e51f48709affa2a0190837031d48f1e4dc16a7ed78029f81b6f092dbc86cff1c675bf66e1c3e72
-
SSDEEP
768:VP5E4C674aDfgF+So703s1fhrI4dxDpe287hjMWHxN21ah5kZEeW:Vm4B8argYg6rI4dZE3KWn21Q5yEeW
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-