General
-
Target
6122d96e83f0c0dad6d1ed8ab22c60b3_JaffaCakes118
-
Size
429KB
-
Sample
240729-z82jvs1dpr
-
MD5
6122d96e83f0c0dad6d1ed8ab22c60b3
-
SHA1
1c9fb09da9a5673b2c821657d1d50440eac79ed6
-
SHA256
3fcab0addd17f497cf4a7bd90ca5797520a26d98d8fd87b3df5f539cf8cf41bb
-
SHA512
943086f85de1d466dffb9e9ce1b4ae4ec18139373a4be92fcbc5e91b3e9edb38fbbcc5b3d9c1522af124870f1db9e750f52b2acc9093c4dde518fc9f2de86560
-
SSDEEP
3072:qxmwANc/nIwANc/nbwANc/nUwANc/nTwANc/nYwANc/ntwANc/n19F:sA29A2cA2ZA20A2NA2+A2nF
Static task
static1
Behavioral task
behavioral1
Sample
6122d96e83f0c0dad6d1ed8ab22c60b3_JaffaCakes118.rtf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6122d96e83f0c0dad6d1ed8ab22c60b3_JaffaCakes118.rtf
Resource
win10v2004-20240709-en
Malware Config
Extracted
https://storage.googleapis.com/wzukusers/user-34654398/documents/5c8fcdc868cf8Nau4eqD/2019
Extracted
https://storage.googleapis.com/wzukusers/user-34654398/documents/5c8fc8d91e717XQDt0y4/ServidorFUDIGOR
Extracted
revengerat
KEROLYN S2
bozok1.duckdns.org:333
RV_MUTEX-iNSnIELecwCkj
Targets
-
-
Target
6122d96e83f0c0dad6d1ed8ab22c60b3_JaffaCakes118
-
Size
429KB
-
MD5
6122d96e83f0c0dad6d1ed8ab22c60b3
-
SHA1
1c9fb09da9a5673b2c821657d1d50440eac79ed6
-
SHA256
3fcab0addd17f497cf4a7bd90ca5797520a26d98d8fd87b3df5f539cf8cf41bb
-
SHA512
943086f85de1d466dffb9e9ce1b4ae4ec18139373a4be92fcbc5e91b3e9edb38fbbcc5b3d9c1522af124870f1db9e750f52b2acc9093c4dde518fc9f2de86560
-
SSDEEP
3072:qxmwANc/nIwANc/nbwANc/nUwANc/nTwANc/nYwANc/ntwANc/n19F:sA29A2cA2ZA20A2NA2+A2nF
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RevengeRat Executable
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-