General
-
Target
eca7e438ad10709a7f1816a406023a61_JaffaCakes118
-
Size
1.6MB
-
Sample
240920-ct6tpstflg
-
MD5
eca7e438ad10709a7f1816a406023a61
-
SHA1
caed3687be32d80134c4efb1e0ed2e5c0d018cb7
-
SHA256
d298f6741d1e6df0f9201d86e9bc89c29f0f37e3c437498f3f5471a56ad80fa0
-
SHA512
7780daa4f8bd3c7fe985018c05e0fa9d38bb4787e40e2652d351393a0b3367447b46e29ec02e92caf554bb96e906ff1e9d805efa2b02caffafecd52b29ac1cb0
-
SSDEEP
12288:J/Z2/ZX/ZY/ZZ/ZC/ZD/ZU/ZF/Zv/Z3/Zs/Z1/Zq/ZT/ZI/ZB/Zm/ZZ/Ze/Z0/Zc:HqBQ3elEbJhMrWVgP63ikZuTl
Static task
static1
Behavioral task
behavioral1
Sample
eca7e438ad10709a7f1816a406023a61_JaffaCakes118.rtf
Resource
win7-20240704-en
Malware Config
Extracted
https://120842333-887063928606937956.preview.editmysite.com/uploads/1/2/0/8/120842333/itr.docx
Extracted
https://120842333-887063928606937956.preview.editmysite.com/uploads/1/2/0/8/120842333/itr2.docx
Extracted
revengerat
Targets
-
-
Target
eca7e438ad10709a7f1816a406023a61_JaffaCakes118
-
Size
1.6MB
-
MD5
eca7e438ad10709a7f1816a406023a61
-
SHA1
caed3687be32d80134c4efb1e0ed2e5c0d018cb7
-
SHA256
d298f6741d1e6df0f9201d86e9bc89c29f0f37e3c437498f3f5471a56ad80fa0
-
SHA512
7780daa4f8bd3c7fe985018c05e0fa9d38bb4787e40e2652d351393a0b3367447b46e29ec02e92caf554bb96e906ff1e9d805efa2b02caffafecd52b29ac1cb0
-
SSDEEP
12288:J/Z2/ZX/ZY/ZZ/ZC/ZD/ZU/ZF/Zv/Z3/Zs/Z1/Zq/ZT/ZI/ZB/Zm/ZZ/Ze/Z0/Zc:HqBQ3elEbJhMrWVgP63ikZuTl
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RevengeRat Executable
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1