General

  • Target

    e9b1d4e23a8d4113905e0bcf15d786be_JaffaCakes118

  • Size

    832KB

  • Sample

    241213-d5dsqsyqbl

  • MD5

    e9b1d4e23a8d4113905e0bcf15d786be

  • SHA1

    4e38509cacf770623ce43c6d4d51a79269f201c5

  • SHA256

    96f9482038457935be7d32971dbeaf8d0ce56d9c0dee163b205b17d62276c790

  • SHA512

    754352b83d9a028608a93c965f347c6ee7927f61954b2b0e14def395360e6ed9b2be63d301d8b5375880ea9d4d4360261056dcef29a057be984f7cc30ccc0ec3

  • SSDEEP

    24576:OoRF0c43r78PbLYKKg3uxfZNgjvVWmL28:LRmX3r78TEK93ut7gbVWmX

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    superhyper007

Targets

    • Target

      e9b1d4e23a8d4113905e0bcf15d786be_JaffaCakes118

    • Size

      832KB

    • MD5

      e9b1d4e23a8d4113905e0bcf15d786be

    • SHA1

      4e38509cacf770623ce43c6d4d51a79269f201c5

    • SHA256

      96f9482038457935be7d32971dbeaf8d0ce56d9c0dee163b205b17d62276c790

    • SHA512

      754352b83d9a028608a93c965f347c6ee7927f61954b2b0e14def395360e6ed9b2be63d301d8b5375880ea9d4d4360261056dcef29a057be984f7cc30ccc0ec3

    • SSDEEP

      24576:OoRF0c43r78PbLYKKg3uxfZNgjvVWmL28:LRmX3r78TEK93ut7gbVWmX

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • RevengeRat Executable

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks