General

  • Target

    69567405eacc7c342c8f3f056b24b4f2_JaffaCakes118

  • Size

    55KB

  • Sample

    240523-b7j2eshc2x

  • MD5

    69567405eacc7c342c8f3f056b24b4f2

  • SHA1

    ce513e25c09b32650fb7650180da773dabd21df3

  • SHA256

    b807888d4cdc5307da585735781aaac9bd46531682c251df4272446f7d1e4555

  • SHA512

    d4ec72926a4fc85fe8f3e2c6204f2a90d231b306fa77207726261151a9f5d8adef146072eb91368004ccf56e85b8d6ca7389809c8dfc6f96f901a88a24a8cbaa

  • SSDEEP

    768:cc6mUzhrzqombIcYTMQ9Ti+UwDFUDcyCC2T:c8UzmYTxzDF+c

Malware Config

Targets

    • Target

      69567405eacc7c342c8f3f056b24b4f2_JaffaCakes118

    • Size

      55KB

    • MD5

      69567405eacc7c342c8f3f056b24b4f2

    • SHA1

      ce513e25c09b32650fb7650180da773dabd21df3

    • SHA256

      b807888d4cdc5307da585735781aaac9bd46531682c251df4272446f7d1e4555

    • SHA512

      d4ec72926a4fc85fe8f3e2c6204f2a90d231b306fa77207726261151a9f5d8adef146072eb91368004ccf56e85b8d6ca7389809c8dfc6f96f901a88a24a8cbaa

    • SSDEEP

      768:cc6mUzhrzqombIcYTMQ9Ti+UwDFUDcyCC2T:c8UzmYTxzDF+c

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks