Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2025 19:37

General

  • Target

    08e6c4943ea9faba1389f62453a46da66c3655cb9d4388cf84534fec8aab9941.exe

  • Size

    1.7MB

  • MD5

    2d42f60e5cb4d8fe1d265828f95feb18

  • SHA1

    6924bba440ec0e521edef61203604b7ea4d5b0ef

  • SHA256

    08e6c4943ea9faba1389f62453a46da66c3655cb9d4388cf84534fec8aab9941

  • SHA512

    50e0ab15502d0f5fd42df277ff7ef1f89f50e8f9d212a7e58f8a4edce6b74f0c87d877336116a26886f452b7c2e21d6601a8d4e03e6deb83af4cbb1f1cdb94d9

  • SSDEEP

    49152:lKyo6/qgZjtg1qPRV9IIsaGysEnsSt0o0MEMUsEs0McUcEy+1:4yo6ictg1qJeaGysEnsS5

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

mr7bashbab.ddns.net:59588

Mutex

1947dc3fb2

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\08e6c4943ea9faba1389f62453a46da66c3655cb9d4388cf84534fec8aab9941.exe
    "C:\Users\Admin\AppData\Local\Temp\08e6c4943ea9faba1389f62453a46da66c3655cb9d4388cf84534fec8aab9941.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3604-0-0x00007FFDAB930000-0x00007FFDABB25000-memory.dmp

    Filesize

    2.0MB

  • memory/3604-1-0x00000000004E0000-0x0000000000694000-memory.dmp

    Filesize

    1.7MB

  • memory/3604-2-0x0000000005070000-0x000000000510C000-memory.dmp

    Filesize

    624KB

  • memory/3604-3-0x00007FFDAB930000-0x00007FFDABB25000-memory.dmp

    Filesize

    2.0MB

  • memory/3604-4-0x0000000004FA0000-0x0000000004FAA000-memory.dmp

    Filesize

    40KB

  • memory/3604-5-0x00000000056C0000-0x0000000005C64000-memory.dmp

    Filesize

    5.6MB

  • memory/3604-6-0x00007FFDAB930000-0x00007FFDABB25000-memory.dmp

    Filesize

    2.0MB