General

  • Target

    9c8faa656313b10e7e2d76f25bc33bfddfbdf2582ba8fe8e0ed3a4ff2ad64c50.js

  • Size

    258KB

  • Sample

    250121-dz9cfstpdl

  • MD5

    48f850f90ba9dd0390c5eb42d0f9bef2

  • SHA1

    578f634534ca0f06f135f6b565f711dfe8d483c2

  • SHA256

    9c8faa656313b10e7e2d76f25bc33bfddfbdf2582ba8fe8e0ed3a4ff2ad64c50

  • SHA512

    5cbd65fccf50bf4166937c3f7060400af067d41822fea947e98ad11c6bbe9b045e08262ab635c7d6aeed2857facb9c639d319ca210b6f7d0d1f0ddccc85493b0

  • SSDEEP

    6144:FGfkaSPcuBpSEGBfpmxD8k0+gHisTt0mCIqceOlgeyy7U00MXfKG:UfkaSPJ96

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

13.49.66.229:333

Mutex

8a25aa6e78e44708a

Targets

    • Target

      9c8faa656313b10e7e2d76f25bc33bfddfbdf2582ba8fe8e0ed3a4ff2ad64c50.js

    • Size

      258KB

    • MD5

      48f850f90ba9dd0390c5eb42d0f9bef2

    • SHA1

      578f634534ca0f06f135f6b565f711dfe8d483c2

    • SHA256

      9c8faa656313b10e7e2d76f25bc33bfddfbdf2582ba8fe8e0ed3a4ff2ad64c50

    • SHA512

      5cbd65fccf50bf4166937c3f7060400af067d41822fea947e98ad11c6bbe9b045e08262ab635c7d6aeed2857facb9c639d319ca210b6f7d0d1f0ddccc85493b0

    • SSDEEP

      6144:FGfkaSPcuBpSEGBfpmxD8k0+gHisTt0mCIqceOlgeyy7U00MXfKG:UfkaSPJ96

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks