General

  • Target

    eca7e438ad10709a7f1816a406023a61_JaffaCakes118

  • Size

    1.6MB

  • Sample

    240920-ct6tpstflg

  • MD5

    eca7e438ad10709a7f1816a406023a61

  • SHA1

    caed3687be32d80134c4efb1e0ed2e5c0d018cb7

  • SHA256

    d298f6741d1e6df0f9201d86e9bc89c29f0f37e3c437498f3f5471a56ad80fa0

  • SHA512

    7780daa4f8bd3c7fe985018c05e0fa9d38bb4787e40e2652d351393a0b3367447b46e29ec02e92caf554bb96e906ff1e9d805efa2b02caffafecd52b29ac1cb0

  • SSDEEP

    12288:J/Z2/ZX/ZY/ZZ/ZC/ZD/ZU/ZF/Zv/Z3/Zs/Z1/Zq/ZT/ZI/ZB/Zm/ZZ/Ze/Z0/Zc:HqBQ3elEbJhMrWVgP63ikZuTl

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://120842333-887063928606937956.preview.editmysite.com/uploads/1/2/0/8/120842333/itr.docx

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://120842333-887063928606937956.preview.editmysite.com/uploads/1/2/0/8/120842333/itr2.docx

Extracted

Family

revengerat

Mutex

Targets

    • Target

      eca7e438ad10709a7f1816a406023a61_JaffaCakes118

    • Size

      1.6MB

    • MD5

      eca7e438ad10709a7f1816a406023a61

    • SHA1

      caed3687be32d80134c4efb1e0ed2e5c0d018cb7

    • SHA256

      d298f6741d1e6df0f9201d86e9bc89c29f0f37e3c437498f3f5471a56ad80fa0

    • SHA512

      7780daa4f8bd3c7fe985018c05e0fa9d38bb4787e40e2652d351393a0b3367447b46e29ec02e92caf554bb96e906ff1e9d805efa2b02caffafecd52b29ac1cb0

    • SSDEEP

      12288:J/Z2/ZX/ZY/ZZ/ZC/ZD/ZU/ZF/Zv/Z3/Zs/Z1/Zq/ZT/ZI/ZB/Zm/ZZ/Ze/Z0/Zc:HqBQ3elEbJhMrWVgP63ikZuTl

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • RevengeRat Executable

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Network Share Discovery

      Attempt to gather information on host network.

MITRE ATT&CK Enterprise v15

Tasks