General

  • Target

    07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2.js

  • Size

    256KB

  • Sample

    250121-clafja1lby

  • MD5

    d9502fb08720229c43e883d68c39258c

  • SHA1

    fd889a14456fd1f3a862e6b1d647049c0b63674c

  • SHA256

    07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2

  • SHA512

    bbdc0c079953acc89e25a654445e36a3b4414b527d67137be752b5101562b12c01643a0468edd02ef30baebe9e3098419073f1ff0c7db512b1b57299e72ab7a2

  • SSDEEP

    6144:o0hOy97siZVxLcCIaqIgj2U1Ska535/KBsSTJ/cK144AGxayi7jcvB3zJFCIc:o0hO27siLxLWrpVM

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

13.49.66.229:333

Mutex

8a25aa6e78e44708a

Targets

    • Target

      07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2.js

    • Size

      256KB

    • MD5

      d9502fb08720229c43e883d68c39258c

    • SHA1

      fd889a14456fd1f3a862e6b1d647049c0b63674c

    • SHA256

      07c41d727f11d4594a6591b644eff38c253e44d4cb908cecfdc66b36dae238e2

    • SHA512

      bbdc0c079953acc89e25a654445e36a3b4414b527d67137be752b5101562b12c01643a0468edd02ef30baebe9e3098419073f1ff0c7db512b1b57299e72ab7a2

    • SSDEEP

      6144:o0hOy97siZVxLcCIaqIgj2U1Ska535/KBsSTJ/cK144AGxayi7jcvB3zJFCIc:o0hO27siLxLWrpVM

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks