General
-
Target
213857b03db27acb0cb52357799ba8f3ce4adb843e66ddc35bf8949d10ebd61a.js
-
Size
60KB
-
Sample
241016-bnr8pazbml
-
MD5
14e68a45361bb287393747ce2b271838
-
SHA1
16144ac8dc7ecc27e4667a3241da8810f8b84778
-
SHA256
213857b03db27acb0cb52357799ba8f3ce4adb843e66ddc35bf8949d10ebd61a
-
SHA512
1a865076c36fa8bf69eba5aca97298be88b093f50af16b63ac878a6482f928c418e547296d00075e1a27c85580af337e8f41781180eee50755754d8915dbe8fb
-
SSDEEP
768:tvRmozOfNAG9lUAy1NgRXbkDvAAdkqC9m3ppOJlPcLNdpgF3hFAto:94oifpTq1NxAAiqC9mZpk8NdpW3hF2o
Static task
static1
Behavioral task
behavioral1
Sample
213857b03db27acb0cb52357799ba8f3ce4adb843e66ddc35bf8949d10ebd61a.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
213857b03db27acb0cb52357799ba8f3ce4adb843e66ddc35bf8949d10ebd61a.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
revengerat
NyanCatRevenge
54.146.241.16:5222
f9796de67e
Targets
-
-
Target
213857b03db27acb0cb52357799ba8f3ce4adb843e66ddc35bf8949d10ebd61a.js
-
Size
60KB
-
MD5
14e68a45361bb287393747ce2b271838
-
SHA1
16144ac8dc7ecc27e4667a3241da8810f8b84778
-
SHA256
213857b03db27acb0cb52357799ba8f3ce4adb843e66ddc35bf8949d10ebd61a
-
SHA512
1a865076c36fa8bf69eba5aca97298be88b093f50af16b63ac878a6482f928c418e547296d00075e1a27c85580af337e8f41781180eee50755754d8915dbe8fb
-
SSDEEP
768:tvRmozOfNAG9lUAy1NgRXbkDvAAdkqC9m3ppOJlPcLNdpgF3hFAto:94oifpTq1NxAAiqC9mZpk8NdpW3hF2o
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-