General

  • Target

    1ff4bc49f5b04cb1e8b55666b0e84b1a_JaffaCakes118

  • Size

    2.3MB

  • Sample

    241008-gphcrssdkj

  • MD5

    1ff4bc49f5b04cb1e8b55666b0e84b1a

  • SHA1

    5bb98a4c69ea160250a67107cb12ce8bed84fd99

  • SHA256

    9e6938e3e4f00a49851275cdc451fabf7d56049ac62322c0919997b4e006cf1a

  • SHA512

    513e6e150c6e878c19cc03c16cfebe1ad848cda6801ea14e53e1e0af96e331b4a2c1bbc617460dc27bebc00f64ccc27617f91befa38d18e09ba2af4ea1c31bb2

  • SSDEEP

    24576:rYPcv5AkZNQ1cxHwMn208QkH5tAN9D7mk7IbffdhX6IYf8WI7YBfkaHzflTx/gvT:EPoQp

Malware Config

Targets

    • Target

      1ff4bc49f5b04cb1e8b55666b0e84b1a_JaffaCakes118

    • Size

      2.3MB

    • MD5

      1ff4bc49f5b04cb1e8b55666b0e84b1a

    • SHA1

      5bb98a4c69ea160250a67107cb12ce8bed84fd99

    • SHA256

      9e6938e3e4f00a49851275cdc451fabf7d56049ac62322c0919997b4e006cf1a

    • SHA512

      513e6e150c6e878c19cc03c16cfebe1ad848cda6801ea14e53e1e0af96e331b4a2c1bbc617460dc27bebc00f64ccc27617f91befa38d18e09ba2af4ea1c31bb2

    • SSDEEP

      24576:rYPcv5AkZNQ1cxHwMn208QkH5tAN9D7mk7IbffdhX6IYf8WI7YBfkaHzflTx/gvT:EPoQp

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks