General

  • Target

    ededa2f0f915bc3617f63ac1586b40bb_JaffaCakes118

  • Size

    17KB

  • Sample

    240920-tbmfsavarb

  • MD5

    ededa2f0f915bc3617f63ac1586b40bb

  • SHA1

    463bde5b8c5d22b94e35fb39aad7ddc5f5247eec

  • SHA256

    ced602ff9094977c33eabbd11a6dcc66656671d5f47596774ecc4792330d2d6a

  • SHA512

    afae21c1bda91ab68e6dd72137eb8b1022f73f1b1307152e2cd87d8e44080fdb17abb922df10dd79d08159fdedcfb611d1ee99034bfac92aed7b95d7c03c96cf

  • SSDEEP

    384:aFylyqmx99hQsZVr5ILeNpvnbqsx0CynZ3s2:aFyl5mx9gAB5ILeLOLB

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

193.161.193.99:40024

Mutex

RV_MUTEX

Targets

    • Target

      ededa2f0f915bc3617f63ac1586b40bb_JaffaCakes118

    • Size

      17KB

    • MD5

      ededa2f0f915bc3617f63ac1586b40bb

    • SHA1

      463bde5b8c5d22b94e35fb39aad7ddc5f5247eec

    • SHA256

      ced602ff9094977c33eabbd11a6dcc66656671d5f47596774ecc4792330d2d6a

    • SHA512

      afae21c1bda91ab68e6dd72137eb8b1022f73f1b1307152e2cd87d8e44080fdb17abb922df10dd79d08159fdedcfb611d1ee99034bfac92aed7b95d7c03c96cf

    • SSDEEP

      384:aFylyqmx99hQsZVr5ILeNpvnbqsx0CynZ3s2:aFyl5mx9gAB5ILeLOLB

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks