Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2024, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
1ba361bf8c073990293ed37ef9baa134_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1ba361bf8c073990293ed37ef9baa134_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
1ba361bf8c073990293ed37ef9baa134_JaffaCakes118.exe
-
Size
38KB
-
MD5
1ba361bf8c073990293ed37ef9baa134
-
SHA1
29452eb1dcf9d91dc22197c9f0779599d672b4b0
-
SHA256
4b4c5f9416a0f5c2599261d544af6e67addf1629c6366387e5a167b7966a8f79
-
SHA512
c8b224b6e496b03ce4e94e2a3f6841e03b966914f7fe563ebffa7c316a84d3cab474a726a941cab3b7e5accd5a049741ec1e1e5f38e4fdcc951487dc939af6f5
-
SSDEEP
768:8TVW3XvI6c4Efltn3WIzvu0x5GeK2ylUvhUHwIyccpJG5W+R4S:8TVWHvI34E3WIzvFG1v9McUG5Wu4S
Malware Config
Extracted
revengerat
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/memory/4180-4-0x00000000013F0000-0x00000000013F8000-memory.dmp revengerat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4180 1ba361bf8c073990293ed37ef9baa134_JaffaCakes118.exe