General

  • Target

    04f9cd1f32905fa8282895840e8d3645_JaffaCakes118

  • Size

    472KB

  • Sample

    240328-n3wkwabg9y

  • MD5

    04f9cd1f32905fa8282895840e8d3645

  • SHA1

    ac932595c0cc0fb578e08ac91ebfdd829e64d8d0

  • SHA256

    def80f5379a616c7985d76932c65e4d35b53287eba6ad964a08a3e9d589be0bf

  • SHA512

    94832cfdd761f6e2128f0b53ab79be5fb70bef59d767c48f946878c706ee4af5e0d59053ac99b515719b253c37f521d60d2296338285fbb4075c81b061e00ae2

  • SSDEEP

    6144:7SwCUX1hmXi5Zhr9Dc4f4y3u3VwiaVYu5oLC9:751R35B

Malware Config

Extracted

Family

revengerat

Botnet

yeah bb!

C2

xd.zapto.org:1990

Mutex

RV_MUTEX-aawrHJfWfhaRCl

Targets

    • Target

      04f9cd1f32905fa8282895840e8d3645_JaffaCakes118

    • Size

      472KB

    • MD5

      04f9cd1f32905fa8282895840e8d3645

    • SHA1

      ac932595c0cc0fb578e08ac91ebfdd829e64d8d0

    • SHA256

      def80f5379a616c7985d76932c65e4d35b53287eba6ad964a08a3e9d589be0bf

    • SHA512

      94832cfdd761f6e2128f0b53ab79be5fb70bef59d767c48f946878c706ee4af5e0d59053ac99b515719b253c37f521d60d2296338285fbb4075c81b061e00ae2

    • SSDEEP

      6144:7SwCUX1hmXi5Zhr9Dc4f4y3u3VwiaVYu5oLC9:751R35B

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks