General

  • Target

    2baa495f4e812fa3381f052b45a605d8_JaffaCakes118

  • Size

    17KB

  • Sample

    240728-3rzwgswdlc

  • MD5

    2baa495f4e812fa3381f052b45a605d8

  • SHA1

    701febfe0b597842dd9f08a4dc790b6924c43fd7

  • SHA256

    96337453f859782a8193073c8d903ccbe44fc23e86af0e1c08e53cc91aafc44a

  • SHA512

    3e1f8384933fc33df25a327926bfa2704d1850b44d12f509b69e48af8335c2bc5f5bb7c7162de7d4ecaf15706f0760442700a21ec6902d0092d14fa768c6424f

  • SSDEEP

    384:wZT/K4hi017SdSTLeNNvnbqsoAfy8Z3s2:wZTL1EMLevOiB

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

coelhinhohacker.ddns.net:4040

Mutex

RV_MUTEX

Targets

    • Target

      2baa495f4e812fa3381f052b45a605d8_JaffaCakes118

    • Size

      17KB

    • MD5

      2baa495f4e812fa3381f052b45a605d8

    • SHA1

      701febfe0b597842dd9f08a4dc790b6924c43fd7

    • SHA256

      96337453f859782a8193073c8d903ccbe44fc23e86af0e1c08e53cc91aafc44a

    • SHA512

      3e1f8384933fc33df25a327926bfa2704d1850b44d12f509b69e48af8335c2bc5f5bb7c7162de7d4ecaf15706f0760442700a21ec6902d0092d14fa768c6424f

    • SSDEEP

      384:wZT/K4hi017SdSTLeNNvnbqsoAfy8Z3s2:wZTL1EMLevOiB

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks