General
-
Target
ac0f1be789f3f35ce6e6482c574f29bdaa51b67fb5dd868688cbc070a5128bac.ppam
-
Size
27KB
-
Sample
240828-st5jmswapk
-
MD5
9abe6399117db22ab034d5f0e5a10405
-
SHA1
dd50c7810bdb8e984abb9be6621800859080de74
-
SHA256
ac0f1be789f3f35ce6e6482c574f29bdaa51b67fb5dd868688cbc070a5128bac
-
SHA512
78abc8d8e1e70087f4d3530c8797d348714c3f4f0d31fcd5e8537c71a04f466d92f647b31a6134b3b3e940dabf760e26ec9fc3d0a79cf119230e7c61a11a3a5d
-
SSDEEP
768:VPSyPjnMWWhFevmEnIaxMUisHSrczYGnp:Vqy7nMrFaPB+UtHSIzYGp
Static task
static1
Behavioral task
behavioral1
Sample
ac0f1be789f3f35ce6e6482c574f29bdaa51b67fb5dd868688cbc070a5128bac.ppam
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ac0f1be789f3f35ce6e6482c574f29bdaa51b67fb5dd868688cbc070a5128bac.ppam
Resource
win10v2004-20240802-en
Malware Config
Extracted
revengerat
NyanCatRevenge
18.228.165.84:3333
788bf014999d4ae8929
Targets
-
-
Target
ac0f1be789f3f35ce6e6482c574f29bdaa51b67fb5dd868688cbc070a5128bac.ppam
-
Size
27KB
-
MD5
9abe6399117db22ab034d5f0e5a10405
-
SHA1
dd50c7810bdb8e984abb9be6621800859080de74
-
SHA256
ac0f1be789f3f35ce6e6482c574f29bdaa51b67fb5dd868688cbc070a5128bac
-
SHA512
78abc8d8e1e70087f4d3530c8797d348714c3f4f0d31fcd5e8537c71a04f466d92f647b31a6134b3b3e940dabf760e26ec9fc3d0a79cf119230e7c61a11a3a5d
-
SSDEEP
768:VPSyPjnMWWhFevmEnIaxMUisHSrczYGnp:Vqy7nMrFaPB+UtHSIzYGp
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-