General

  • Target

    403b7e75b683a9e62b194aa319b6a89d_JaffaCakes118

  • Size

    268KB

  • Sample

    241013-q8w5pszdne

  • MD5

    403b7e75b683a9e62b194aa319b6a89d

  • SHA1

    46ee35eb4792314d30cf554648c07f8f14683819

  • SHA256

    1e5d173cffbdd36f13fcebb3e8be1648606e50196e8b4358fb8635fce8cd9dda

  • SHA512

    92314a47ae40731775abb8c899a931cd6f38c8c0150fcc6fc0fc0d3dd5b103313c2a565b3667027e0b61c097595fee85bea309e333512a3241611c22a9819e16

  • SSDEEP

    3072:yW7rphkqhtviNz4C6xV3mGnO927SEMWAD+QNNoJ82uzt4:/piG8bs76D+D2i

Malware Config

Targets

    • Target

      403b7e75b683a9e62b194aa319b6a89d_JaffaCakes118

    • Size

      268KB

    • MD5

      403b7e75b683a9e62b194aa319b6a89d

    • SHA1

      46ee35eb4792314d30cf554648c07f8f14683819

    • SHA256

      1e5d173cffbdd36f13fcebb3e8be1648606e50196e8b4358fb8635fce8cd9dda

    • SHA512

      92314a47ae40731775abb8c899a931cd6f38c8c0150fcc6fc0fc0d3dd5b103313c2a565b3667027e0b61c097595fee85bea309e333512a3241611c22a9819e16

    • SSDEEP

      3072:yW7rphkqhtviNz4C6xV3mGnO927SEMWAD+QNNoJ82uzt4:/piG8bs76D+D2i

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks