General
-
Target
0000003323677.js
-
Size
253KB
-
Sample
250120-q89qsssmcx
-
MD5
453bc0d9d84305bd4811c8c0c8622db6
-
SHA1
85553506f2dc5abcec56a06cb36f69c0b046efa4
-
SHA256
862502255d9fd9eb8f658e23f3833e7cd211514cb9f9a6a2853ae9858d3843f7
-
SHA512
af6ef42e885481ae3bc0939017c8eb328531ea50d7eb852bd7b5b744a70d202e57f09f2671ab1553c05d4c53181973896c44109e7eb19f7fb0d087f697632d87
-
SSDEEP
6144:p8t+pgvJENiy2BMs+1WKKL7EVLy19uQTuol9nv2RWoaAImBeN1PXY1qm:p8kpgvJENZ2JJLm
Static task
static1
Behavioral task
behavioral1
Sample
0000003323677.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0000003323677.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
revengerat
NyanCatRevenge
13.49.66.229:333
8a25aa6e78e44708a
Targets
-
-
Target
0000003323677.js
-
Size
253KB
-
MD5
453bc0d9d84305bd4811c8c0c8622db6
-
SHA1
85553506f2dc5abcec56a06cb36f69c0b046efa4
-
SHA256
862502255d9fd9eb8f658e23f3833e7cd211514cb9f9a6a2853ae9858d3843f7
-
SHA512
af6ef42e885481ae3bc0939017c8eb328531ea50d7eb852bd7b5b744a70d202e57f09f2671ab1553c05d4c53181973896c44109e7eb19f7fb0d087f697632d87
-
SSDEEP
6144:p8t+pgvJENiy2BMs+1WKKL7EVLy19uQTuol9nv2RWoaAImBeN1PXY1qm:p8kpgvJENZ2JJLm
Score10/10-
Revengerat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-